cve-2022-23830
Vulnerability from cvelistv5
Published
2023-11-14 18:53
Modified
2024-08-03 03:51
Summary
SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
Impacted products
Vendor Product Version
AMD 4th Gen AMD EPY™ Processors Version: various
AMD AMD EPYC™ Embedded 7003 Version: various
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:51:45.987Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "4th Gen AMD EPY\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:41:52.383Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2022-23830",
    "datePublished": "2023-11-14T18:53:28.408Z",
    "dateReserved": "2022-01-21T17:20:55.781Z",
    "dateUpdated": "2024-08-03T03:51:45.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-23830\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2023-11-14T19:15:10.570\",\"lastModified\":\"2024-11-21T06:49:20.293\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.\"},{\"lang\":\"es\",\"value\":\"Es posible que la configuraci\u00f3n de SMM no sea inmutable, como se esperaba, cuando SNP est\u00e1 habilitado, lo que genera una posible p\u00e9rdida limitada de la integridad de la memoria del hu\u00e9sped.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@amd.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":1.9,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.5,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"EB9C77FA-9807-4233-BE30-9275ADEF6930\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C150CC54-2F64-48E7-B996-F06247114BC4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"4960A6A2-CEAB-4970-A1B8-9ABA220ACBE6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84209250-5078-4E8E-8532-98F652C12D79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"4ADE7FD0-2BE7-4928-A556-5831C7CEA16D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"3E95DA74-848F-4036-9A79-35D29ECE3D09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"93A27BB9-F55D-43A4-A439-5D5773057B3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A95FCDE4-82EF-4C54-A85D-960B36A46DD0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"A46BF53F-F940-44A1-9E0B-068677C4AC90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8FC239C-6B12-4F7C-A725-9D66AD39F7F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"ECB7FCFC-A27A-4656-967A-517F591BB3C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1520823-129F-4F48-932B-1CA77D3446CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"90030672-613B-4252-922D-7F26D2FCA877\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"932E47BF-3831-4D72-9F26-89CA591692B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"8EFBA5F7-E9BE-4EDB-BD4E-D4316B0D945A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"F21FC32C-DDA2-4804-9EDA-C9BEB18C9AC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14BA8C50-B57A-4F6D-860B-790BD39249B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"7DAF542F-040B-4681-BCEA-E4F1F99ABD00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF0F7101-1B8B-454B-879F-8635CB16D5C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"C3710FCB-CAF1-4BFE-A984-0C46BA27F9BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A152B84-4935-4517-BD9D-37471C281BDA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"8EC0604A-D5DA-4966-AF48-EBAB46F1BD61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B1047C6-4627-4520-AFF7-5A0A623336F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"9E087AEC-06E1-4A95-A644-7587331DEE55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54EE0A4A-AA13-49CE-8825-407AD6B16B13\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"8ED6C058-3CE9-4E68-8FBF-19942D6678F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFDF951D-9B67-49CE-AD4A-B1052A484E65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"53BDC783-1492-4A3A-B75E-DA98B366D43D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B085546F-4791-4096-A019-738A37353165\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"E8937722-6B70-42F4-913F-55881066C571\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7811418-4B63-4CCA-B81F-379FF0277673\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"A3857E72-56F0-426D-A9AD-60B5711CE5DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2761489D-AABE-4ADD-AE5B-B26C4424F18A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"67C3F794-B9D2-4BDA-ABB4-397C8B074B30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A34603-6EB8-4D75-9391-8ADC35EA5EFE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"BDC6D4D7-F7DE-4B35-AE48-C20A86CB56B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6DC6F07-2E27-48C3-BD60-81496C2D3C62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"BB1C6B4C-0A4A-4F47-B22A-9B070C3834E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C3085B2-AFDA-4C34-A2B6-40D599F7E907\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"6521FCD8-ACD3-4EFC-881D-C82AFBB57100\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"93096670-AB65-461B-AD8C-725B525AB2D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E74F229A-FDBD-4C3D-BE0B-9193E6E560ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"1A7CE606-63D1-488C-BCCE-37098C57BBB9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"CE8D62F4-A1FE-4865-ACE3-22E621873085\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEABF567-1E41-4FD2-876E-7D2689A01D51\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"9A95DADE-44C0-4A3B-8ED9-9F32CEFE28C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AF46284-ED2F-45F9-A4E8-221593FB7F49\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"04468F0E-494D-43F5-898A-FBBF60CBDEF5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5323D02F-E25A-460D-8DA1-F8C72E635E53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"92561B70-9884-461C-B493-437BC64DE56A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9241D42-1771-4528-8436-EE3FDE20C042\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"229D581F-A875-4E50-9C70-4978F4213110\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"3A239F9E-D957-43B9-BE84-925E034C7D1B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4886768-DAFF-481E-894F-F8E816B36EB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"86181C40-CBE2-4AAC-A853-F36372372D41\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF4C36B4-CC5F-4A66-9294-71E0531E80F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"DAF54712-9455-453E-82C6-A64209D2F1D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15981CBF-CB09-416E-AB31-54D650182EBD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"B7340146-AF63-444A-915D-DC78E509C8D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E828D3FB-9EF3-40C4-B338-7BCF73C6EF37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"0BF77B4F-61B5-4F13-9724-A085329D6827\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B24580CA-3A31-4775-AD72-DF1DB6CB84C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"E35B55E0-0EBD-4232-B24D-D8D9B10540A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BACF50-D9DB-4207-BF61-CACDCC3870E9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"genoapi_1.0.0.1\",\"matchCriteriaId\":\"C00B3DBF-DF5C-4B22-B945-9B2A0E04946C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"364B9EAB-E113-4370-ACDC-92BFD54BEF88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"DB3B006E-3930-4DD8-9E4E-1B520DB45535\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F900BDD-F094-41A6-9A23-31F53DBA95D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"30013429-BC7F-4A52-A7AB-49FE91F6C5CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2299ED50-B4D2-4BB3-AD87-56D552B84AE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"EA3D1AF4-E79F-4B8B-ACD1-286A1CF354E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D698D3E-BB05-4C65-90F4-8DAE275CD6A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"30C1D9D9-875C-4841-9B32-48344DEA077D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7B5F0D8-2659-494C-8FB9-50A797CE0CA9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"3E8D2D9C-20CD-48C4-AA06-365D78250058\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DFCB62-6CDF-4AD2-9265-1887E5780CA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"285125AF-8AA5-437E-AF78-F2625D9136A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F05F9B7A-9777-461E-B88E-96592F87A49E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"6F6E8DC7-2E57-490D-B32D-E1F33BB36839\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02B1C69-BAA4-485B-BE22-46BE321F9E4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"D7FAFC36-0BCA-43CE-B22B-65C98C748315\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"4C9015CD-8EDF-4D8E-A582-D04DD2425887\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"F4680D11-F4E7-4F76-93AB-EF6183D024A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF0AFED-588A-4EFB-8C90-9280BC3A6720\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"DB47A44F-26AF-42DC-B388-C2A84B95C8FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A0A47B-74A1-4731-92A8-BC10FFE58ECF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"204719EA-FF4B-4674-B270-1790035594A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52544912-FAA3-4025-A5FD-151B21CEC53B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"5F523DAE-2F55-4822-92A1-218AA886313B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8264DF4-47B4-4716-AE89-44AFA870D385\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"6AC49F14-804A-480A-BA66-373C00606F98\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07E922F-C1AB-469C-A1C1-9F9E58332DFC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"B12BD5A2-3A94-4016-BDE1-F268AB8A142A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"241E39FF-FE66-444C-A4C2-3D28C45341BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"1C61B330-4DD0-47E7-ACEC-0871EB497DF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D08121-DC57-47D7-8214-23A209F0AF08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"9C0E4DD8-E76E-4938-9680-64C70A2FE378\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2B13CA-72F4-4CF6-9E12-62E6E9056A14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"AA9F63C2-A774-4B4C-BDD4-1F374AABCC81\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C474537-3006-41BA-8C3D-5C370E3ACECD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"4FCBCFE9-D650-4149-871D-4F4597198C6C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1766FF1-77A9-4293-B826-F6A8FBD7AFBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"E88129DB-E22D-4AB3-8A0C-4F067711C767\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180B3002-B3C5-48B5-8322-5B64B237C5B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"DBE8BBCE-3D9F-4F8E-AEB8-1FCBA3FF0D87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"678C5F58-8AE9-46FF-8F01-4CF394C87A2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"33CAD962-9D64-430A-A1DC-15B05B4670F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71B9C24B-2C10-4826-A91B-E1C60665FBBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"F2FEC040-4236-4E6D-85D5-BB52E5A81B5B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9000686A-DC2B-4561-9C32-E90890EB2EBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"7A9166CC-1C29-430F-B766-7408B3F47855\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02B61B7-7DD3-4164-8D32-EB961E981BC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"91DAAC8F-AF6C-4146-BCFE-1DCE96D49644\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88ACBFE2-C462-454E-9481-34BDF42237C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"EEAE9F6D-54F8-46B6-BB04-6EA9E46CE742\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE26D1A9-79F1-48B0-854F-84421A261E5C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"0218786D-D198-44BE-9CA2-FCD1B622BD9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"F21B87C3-72D1-4CEC-8D63-58E38C741AA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A50B483-D20C-4BD4-94FA-01B8C9A904D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.a\",\"matchCriteriaId\":\"FB0AE5AB-0490-453A-9D27-81DE5F08CE1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F44C8195-1621-4327-BBFA-8AFA36BED7AA\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001\",\"source\":\"psirt@amd.com\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.