CVE-2023-20593
Key Information:
- Vendor
- Amd
- Status
- Ryzen™ 3000 Series Desktop Processors “matisse” Am4
- Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics “renoir” Am4
- 3rd Gen Amd Ryzen™ Threadripper™ Processors “castle Peak” Hedt
- Ryzen™ Threadripper™ Pro Processors “castle Peak” Ws Sp3
- Vendor
- CVE Published:
- 24 July 2023
Badges
Summary
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
Affected Version(s)
2nd Gen AMD EPYC™ Processors x86 various
3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT x86 various
AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4 x86 various
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
Security update for the Linux Kernel | SUSE Support
Announcement of Security update for the Linux Kernel. Maximize the value of open source with SUSE solution, backed by SUSE Support.
9 months ago
Security update for the Linux Kernel | SUSE Support
Announcement of Security update for the Linux Kernel. Maximize the value of open source with SUSE solution, backed by SUSE Support.
9 months ago
References
CVSS V3.1
Timeline
- 📰
First article discovered by SUSE
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved