Vulnerabilites related to AMD - Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3
cve-2023-20594
Vulnerability from cvelistv5
Published
2023-09-20 17:27
Modified
2024-09-25 15:26
Severity ?
Summary
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
Impacted products
Vendor Product Version
AMD Ryzen™ 3000 Series Desktop Processors “Matisse” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” Version: various
Create a notification for this product.
   AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4 Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3 Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS SP3 Version: various
Create a notification for this product.
   AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6 Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne” Version: various
Create a notification for this product.
   AMD Ryzen™ 6000 Series Mobile Processors with Radeon™ Graphics "Rembrandt" Version: various
Create a notification for this product.
   AMD Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics "Rembrandt-R" Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics "Barcelo" Version: various
Create a notification for this product.
   AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R” Version: various
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:36.973Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20594",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-25T15:25:52.143486Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-25T15:26:01.771Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 3000 Series Desktop Processors “Matisse”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Desktop Processors “Vermeer” ",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics  “Cezanne” ",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS SP3",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” ",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 6000 Series Mobile Processors with Radeon™ Graphics \"Rembrandt\"",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics \"Rembrandt-R\"",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics \"Barcelo\"",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R” ",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "3rd Gen AMD EPYC™ Processors",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2023-09-20T16:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n<span style=\"background-color: rgb(248, 249, 250);\">Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.</span>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
                  },
               ],
               value: "\nImproper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-20T17:27:59.742Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007",
            },
         ],
         source: {
            advisory: "AMD-SB-4007",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-20594",
      datePublished: "2023-09-20T17:27:59.742Z",
      dateReserved: "2022-10-27T18:53:39.762Z",
      dateUpdated: "2024-09-25T15:26:01.771Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20593
Vulnerability from cvelistv5
Published
2023-07-24 19:38
Modified
2025-02-13 16:39
Severity ?
Summary
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
References
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008vendor-advisory
http://xenbits.xen.org/xsa/advisory-433.html
http://www.openwall.com/lists/oss-security/2023/07/24/3
http://seclists.org/fulldisclosure/2023/Jul/43
http://www.openwall.com/lists/oss-security/2023/07/25/5
http://www.openwall.com/lists/oss-security/2023/07/25/6
http://www.openwall.com/lists/oss-security/2023/07/25/1
http://www.openwall.com/lists/oss-security/2023/07/25/13
http://www.openwall.com/lists/oss-security/2023/07/25/17
http://www.openwall.com/lists/oss-security/2023/07/25/12
http://www.openwall.com/lists/oss-security/2023/07/25/16
http://www.openwall.com/lists/oss-security/2023/07/25/14
http://www.openwall.com/lists/oss-security/2023/07/25/15
http://www.openwall.com/lists/oss-security/2023/07/26/1
https://cmpxchg8b.com/zenbleed.html
https://www.debian.org/security/2023/dsa-5459
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://www.debian.org/security/2023/dsa-5462
https://www.debian.org/security/2023/dsa-5461
https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html
http://www.openwall.com/lists/oss-security/2023/07/31/2
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/
http://www.openwall.com/lists/oss-security/2023/08/08/7
http://www.openwall.com/lists/oss-security/2023/08/08/8
http://www.openwall.com/lists/oss-security/2023/08/08/6
http://www.openwall.com/lists/oss-security/2023/08/16/4
http://www.openwall.com/lists/oss-security/2023/08/16/5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
http://www.openwall.com/lists/oss-security/2023/09/22/9
http://www.openwall.com/lists/oss-security/2023/09/22/11
http://www.openwall.com/lists/oss-security/2023/09/25/4
http://www.openwall.com/lists/oss-security/2023/09/25/7
https://security.netapp.com/advisory/ntap-20240531-0004/
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:45.858Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://xenbits.xen.org/xsa/advisory-433.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/24/3",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2023/Jul/43",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/25/5",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/25/6",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/25/1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/25/13",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/25/17",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/25/12",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/25/16",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/25/14",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/25/15",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/26/1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cmpxchg8b.com/zenbleed.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5459",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5462",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2023/dsa-5461",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/07/31/2",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/08/08/7",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/08/08/8",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/08/08/6",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/08/16/4",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/08/16/5",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/09/22/9",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/09/22/11",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/09/25/4",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2023/09/25/7",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20240531-0004/",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20593",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-19T16:07:50.725588Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-209",
                        description: "CWE-209 Generation of Error Message Containing Sensitive Information",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-19T16:08:15.479Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 3000 Series Desktop Processors “Matisse” AM4",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Lucienne”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 4000 Series Mobile processors with Radeon™ Graphics “Renoir”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 7020 Series processors “Mendocino” FT6",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "µcode / AGESA™ firmware",
               platforms: [
                  "x86",
               ],
               product: "2nd Gen AMD EPYC™ Processors",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2023-07-24T19:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<span style=\"background-color: rgb(248, 249, 250);\">An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.</span>\n\n\n\n\n\n<br>",
                  },
               ],
               value: "An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-06-10T17:12:11.483Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008",
            },
            {
               url: "http://xenbits.xen.org/xsa/advisory-433.html",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/24/3",
            },
            {
               url: "http://seclists.org/fulldisclosure/2023/Jul/43",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/25/5",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/25/6",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/25/1",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/25/13",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/25/17",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/25/12",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/25/16",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/25/14",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/25/15",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/26/1",
            },
            {
               url: "https://cmpxchg8b.com/zenbleed.html",
            },
            {
               url: "https://www.debian.org/security/2023/dsa-5459",
            },
            {
               url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
            },
            {
               url: "https://www.debian.org/security/2023/dsa-5462",
            },
            {
               url: "https://www.debian.org/security/2023/dsa-5461",
            },
            {
               url: "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/07/31/2",
            },
            {
               url: "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/08/08/7",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/08/08/8",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/08/08/6",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/08/16/4",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/08/16/5",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/",
            },
            {
               url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/09/22/9",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/09/22/11",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/09/25/4",
            },
            {
               url: "http://www.openwall.com/lists/oss-security/2023/09/25/7",
            },
            {
               url: "https://security.netapp.com/advisory/ntap-20240531-0004/",
            },
         ],
         source: {
            advisory: "AMD-SB-7008",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-20593",
      datePublished: "2023-07-24T19:38:43.385Z",
      dateReserved: "2022-10-27T18:53:39.762Z",
      dateUpdated: "2025-02-13T16:39:49.154Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-23821
Vulnerability from cvelistv5
Published
2023-11-14 18:54
Modified
2024-12-03 14:26
Severity ?
Summary
Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.
Impacted products
Vendor Product Version
AMD Ryzen™ 3000 Series Desktop Processors “Matisse” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” AM4 Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ 2000 Series Processors “Colfax” Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3 Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” FP5 Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock” Version: various
Create a notification for this product.
   AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics “Picasso” FP5 Version: various
Create a notification for this product.
   AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6 Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” AM4 Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne” Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics "Rembrandt" Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R” Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics “Barcelo” Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R” Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded R1000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded R2000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded 5000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded V1000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded V2000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded V3000 Version: various
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T03:51:46.017Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002",
               },
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-23821",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2023-12-05T20:28:42.236096Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-03T14:26:05.643Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 3000 Series Desktop Processors “Matisse”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Desktop Processors “Vermeer”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics  “Cezanne”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” AM4",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ 2000 Series Processors “Colfax”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ PRO 3000WX Series Processors  “Chagall” WS",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” FP5",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics   “Pollock”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics “Picasso” FP5",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” AM4",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics \"Rembrandt\"",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics  “Barcelo”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "PI",
               platforms: [
                  "x86",
               ],
               product: "AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™  Embedded R1000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™  Embedded R2000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™  Embedded 5000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™  Embedded V1000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™  Embedded V2000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™  Embedded V3000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n<br>",
                  },
               ],
               value: "Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-13T19:26:03.900Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002",
            },
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001",
            },
         ],
         source: {
            advisory: "AMD-SB-4002, AMD-SB-5001",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2022-23821",
      datePublished: "2023-11-14T18:54:32.952Z",
      dateReserved: "2022-01-21T17:20:55.779Z",
      dateUpdated: "2024-12-03T14:26:05.643Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20597
Vulnerability from cvelistv5
Published
2023-09-20 17:32
Modified
2024-09-26 16:04
Severity ?
Summary
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:36.261Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20597",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-26T16:02:44.267356Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-26T16:04:20.231Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 3000 Series Desktop Processors “Matisse”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Desktop Processors “Vermeer” ",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics  “Cezanne” ",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS SP3",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 6000 Series Mobile Processors with Radeon™ Graphics \"Rembrandt\"",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics \"Rembrandt-R\"",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics \"Barcelo\"",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R” ",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
         ],
         datePublic: "2023-09-20T16:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n<span style=\"background-color: rgb(248, 249, 250);\">\n\n<span style=\"background-color: rgb(248, 249, 250);\">Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.</span>\n\n</span>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
                  },
               ],
               value: "\n\n\nImproper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-20T17:32:18.969Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007",
            },
         ],
         source: {
            advisory: "AMD-SB-4007",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-20597",
      datePublished: "2023-09-20T17:32:18.969Z",
      dateReserved: "2022-10-27T18:53:39.763Z",
      dateUpdated: "2024-09-26T16:04:20.231Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}