ID CVE-2020-12912
Summary A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.
References
Vulnerable Configurations
  • cpe:2.3:a:amd:energy_driver_for_linux:*:*:*:*:*:*:*:*
    cpe:2.3:a:amd:energy_driver_for_linux:*:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 03-12-2020 - 02:12)
Impact:
Exploitability:
CWE CWE-203
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
refmap via4
misc https://www.amd.com/en/corporate/product-security
Last major update 03-12-2020 - 02:12
Published 12-11-2020 - 20:15
Last modified 03-12-2020 - 02:12
Back to Top