Summary
Detail | |||
---|---|---|---|
Vendor | Amd | First view | 2021-12-10 |
Product | Epyc Embedded 7251 Firmware | Last view | 2023-03-01 |
Version | Type | Os | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:o:amd:epyc_embedded_7251_firmware:-:*:*:*:*:*:*:* | 4 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.7 | 2023-03-01 | CVE-2022-27672 | When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. |
6.5 | 2022-05-11 | CVE-2021-46744 | An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time. |
5.5 | 2022-02-04 | CVE-2020-12966 | AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor. |
8.4 | 2021-12-10 | CVE-2021-26340 | A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM). |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
50% (1) | CWE-203 | Information Exposure Through Discrepancy |
50% (1) | CWE-200 | Information Exposure |