Microarchitectural Vulnerability in AMD Zen 2 CPUs
CVE-2023-20593

5.5MEDIUM

Summary

An issue has been identified within AMD's Zen 2 microarchitecture that could enable an attacker to exploit specific conditions, potentially leading to unauthorized access to sensitive data. This vulnerability underscores the importance of verifying the security of CPU architectures, particularly in environments handling sensitive information. Mitigation measures should be prioritized to ensure system integrity and data protection.

Affected Version(s)

2nd Gen AMD EPYC™ Processors x86 various

3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT x86 various

AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4 x86 various

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Security update for the Linux Kernel | SUSE Support

Announcement of Security update for the Linux Kernel. Maximize the value of open source with SUSE solution, backed by SUSE Support.

Security update for the Linux Kernel | SUSE Support

Announcement of Security update for the Linux Kernel. Maximize the value of open source with SUSE solution, backed by SUSE Support.

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📰

    First article discovered by SUSE

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.