Microarchitectural Vulnerability in AMD Zen 2 CPUs
CVE-2023-20593
Key Information:
- Vendor
- Amd
- Status
- Vendor
- CVE Published:
- 24 July 2023
Badges
Summary
An issue has been identified within AMD's Zen 2 microarchitecture that could enable an attacker to exploit specific conditions, potentially leading to unauthorized access to sensitive data. This vulnerability underscores the importance of verifying the security of CPU architectures, particularly in environments handling sensitive information. Mitigation measures should be prioritized to ensure system integrity and data protection.
Affected Version(s)
2nd Gen AMD EPYC™ Processors x86 various
3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT x86 various
AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4 x86 various
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
Security update for the Linux Kernel | SUSE Support
Announcement of Security update for the Linux Kernel. Maximize the value of open source with SUSE solution, backed by SUSE Support.
Security update for the Linux Kernel | SUSE Support
Announcement of Security update for the Linux Kernel. Maximize the value of open source with SUSE solution, backed by SUSE Support.
References
CVSS V3.1
Timeline
- 📰
First article discovered by SUSE
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved