Lucene search

K
vulnrichmentAMDVULNRICHMENT:CVE-2023-31356
HistoryAug 13, 2024 - 4:54 p.m.

CVE-2023-31356

2024-08-1316:54:23
AMD
github.com
sev firmware
system memory
privileged attacker
data integrity
cve-2023-31356

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Incomplete system memory cleanup in SEV firmware could
allow a privileged attacker to corrupt guest private memory, potentially
resulting in a loss of data integrity.

CNA Affected

[
  {
    "vendor": "AMD",
    "product": "AMD EPYC™ 7003 Processors",
    "versions": [
      {
        "status": "unaffected",
        "version": "MilanPI 1.0.0.C",
        "versionType": "PI"
      }
    ],
    "defaultStatus": "affected"
  },
  {
    "vendor": "AMD",
    "product": "AMD EPYC™ 9004 Processors",
    "versions": [
      {
        "status": "unaffected",
        "version": "GenoaPI 1.0.0.B"
      }
    ],
    "defaultStatus": "affected"
  }
]

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-31356