Attackers Can Modify Communications Buffer for Arbitrary Code Execution
CVE-2023-20578
6.4MEDIUM
Key Information:
- Vendor
- Amd
- Status
- Amd Epyc™ 7001 Processors
- Amd Epyc™ 7002 Processors
- Amd Epyc™ 7003 Processors
- Amd Epyc™ 9004 Processors
- Vendor
- CVE Published:
- 13 August 2024
Summary
A vulnerability exists in the AMD BIOS stemming from a Time-of-Check Time-of-Use (TOCTOU) issue. This flaw can be exploited by attackers who have ring0 privileges and access to critical system components such as the BIOS menu or UEFI shell. By leveraging this vulnerability, an attacker could potentially alter the communications buffer, leading to the execution of arbitrary code. This capability raises significant security concerns as it may allow unauthorized access and control over affected systems.
Affected Version(s)
AMD EPYC™ 7001 Processors NaplesPI 1.0.0.K
AMD EPYC™ 7002 Processors RomePI 1.0.0.G
AMD EPYC™ 7003 Processors MilanPI 1.0.0.B
References
CVSS V3.1
Score:
6.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database