Attackers Can Modify Communications Buffer for Arbitrary Code Execution
CVE-2023-20578

6.4MEDIUM

Key Information:

Vendor
Amd
Status
Amd Epyc™ 7001 Processors
Amd Epyc™ 7002 Processors
Amd Epyc™ 7003 Processors
Amd Epyc™ 9004 Processors
Vendor
CVE Published:
13 August 2024

Summary

A vulnerability exists in the AMD BIOS stemming from a Time-of-Check Time-of-Use (TOCTOU) issue. This flaw can be exploited by attackers who have ring0 privileges and access to critical system components such as the BIOS menu or UEFI shell. By leveraging this vulnerability, an attacker could potentially alter the communications buffer, leading to the execution of arbitrary code. This capability raises significant security concerns as it may allow unauthorized access and control over affected systems.

Affected Version(s)

AMD EPYC™ 7001 Processors NaplesPI 1.0.0.K

AMD EPYC™ 7002 Processors RomePI 1.0.0.G

AMD EPYC™ 7003 Processors MilanPI 1.0.0.B

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.