Potential weakness in AMD SPI protection features may allow malicious attackers to bypass kernel mode protections
CVE-2022-23829
8.2HIGH
Key Information:
Summary
A potential weakness in the SPI protection features of AMD systems enables a malicious actor with Ring0 (kernel mode) access to circumvent the built-in protections of the System Management Mode (SMM) ROM. This may lead to unauthorized access to critical system functions, potentially compromising the integrity of the entire system. Organizations utilizing affected AMD products should assess their security measures and enhance their defenses against potential exploitation.
Affected Version(s)
1st Gen AMD EPYC™ Processors various
2nd Gen AMD EPYC™ Processors various
3rd Gen AMD EPYC™ Processors various
References
CVSS V3.1
Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database