Advanced Micro Devices (AMD) XILINX Z-7020

CPE Details

Advanced Micro Devices (AMD) XILINX Z-7020
-
2022-02-15
16h10 +00:00
2022-02-15
17h00 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:amd:xilinx_z-7020:-:*:*:*:*:*:*:*

Informations

Vendor

amd

Product

xilinx_z-7020

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-20583 2023-08-01 18h00 +00:00 A potential power side-channel vulnerability in AMD processors may allow an authenticated attacker to monitor the CPU power consumption as the data in a cache line changes over time potentially resulting in a leak of sensitive information.
4.7
Medium
CVE-2021-44850 2022-02-10 17h19 +00:00 On Xilinx Zynq-7000 SoC devices, physical modification of an SD boot image allows for a buffer overflow attack in the ROM. Because the Zynq-7000's boot image header is unencrypted and unauthenticated before use, an attacker can modify the boot header stored on an SD card so that a secure image appears to be unencrypted, and they will be able to modify the full range of register initialization values. Normally, these registers will be restricted when booting securely. Of importance to this attack are two registers that control the SD card's transfer type and transfer size. These registers could be modified a way that causes a buffer overflow in the ROM.
6.8
Medium