Advanced Micro Devices (AMD) EPYC EMBEDDED 3201

CPE Details

Advanced Micro Devices (AMD) EPYC EMBEDDED 3201
-
2021-05-21
09h21 +00:00
2021-05-27
11h32 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*

Informations

Vendor

amd

Product

epyc_embedded_3201

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-20583 2023-08-01 18h00 +00:00 A potential power side-channel vulnerability in AMD processors may allow an authenticated attacker to monitor the CPU power consumption as the data in a cache line changes over time potentially resulting in a leak of sensitive information.
4.7
Moyen
CVE-2023-20575 2023-07-11 18h29 +00:00 A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
6.5
Moyen
CVE-2022-27672 2023-02-14 19h34 +00:00 When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.
4.7
Moyen
CVE-2021-46744 2022-05-11 16h40 +00:00 An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.
6.5
Moyen
CVE-2020-12966 2022-02-04 22h29 +00:00 AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.
5.5
Moyen
CVE-2021-26340 2021-12-10 21h55 +00:00 A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM).
8.4
Haute
CVE-2021-26311 2021-05-13 11h06 +00:00 In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
7.2
Haute
CVE-2020-12967 2021-05-13 11h06 +00:00 The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
7.2
Haute