CVE-2023-20563 (GCVE-0-2023-20563)

Vulnerability from cvelistv5 – Published: 2023-11-14 18:54 – Updated: 2024-10-22 13:44
VLAI?
Summary
Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.
Assigner
AMD
Impacted products
Vendor Product Version
AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” Affected: various
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:45.851Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_5000_series_desktop_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_5000_series_desktop_processors_with_radeon_graphics",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "ComboAM4V2 1.2.0.B *(2023-08-25)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_7000_series_desktop_processors:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_7000_series_desktop_processors",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "ComboAM5 1.0.7.0 (2023-04-18)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_5000_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_5000_series_mobile_processors_with_radeon_graphics",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "CezannePI-FP6 1.0.0.F (2023-06-20)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_6000_series_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_6000_series_processors_with_radeon_graphics",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "RembrandtPI-FP7 1.0.0.9 (2023-05-16)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_7035_series_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_7035_series_processors_with_radeon_graphics",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "RembrandtPI-FP7 1.0.0.9 (2023-05-16)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_5000_series_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_5000_series_processors_with_radeon_graphics",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "CezannePI-FP6 1.0.0.F (2023-06-20)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_7030_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_7030_series_mobile_processors_with_radeon_graphics",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "CezannePI-FP6 1.0.0.F (2023-06-20)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_7040_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_7040_series_mobile_processors_with_radeon_graphics",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "PhoenixPI-FP8-FP7 PI 1.0.0.1g (2023-05-11)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_r1000",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "EmbeddedPI-FP5 1.2.0.A (2023-07-31)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_r2000",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "EmbeddedPI-FP5 1.0.0.2 (2023-07-31)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_embedded_5000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_5000",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "EmbAM4PI 1.0.0.3 (2023-07-31)"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_embedded_v3000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_v3000",
            "vendor": "amd",
            "versions": [
              {
                "status": "affected",
                "version": "EmbeddedPI-FP7r2 1.0.0.6 (2023-09-15)"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20563",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T17:15:29.685693Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T13:44:05.548Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics  \u201cCezanne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7000 Series Desktop Processors \u201cRaphael\u201d XD3",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cCezanne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics \"Rembrandt\"",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics \u201cRembrandt-R\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics  \u201cBarcelo\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 7030 Series Mobile Processors with Radeon\u2122 Graphics \u201cBarcelo-R\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7040 Series Mobile Processors with Radeon\u2122 Graphics \u201cPhoenix\u201d FP7/FP7r2/FP8",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122  Embedded R1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122  Embedded R2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122  Embedded 5000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122  Embedded V3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-13T19:27:18.318Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20563",
    "datePublished": "2023-11-14T18:54:41.308Z",
    "dateReserved": "2022-10-27T18:53:39.747Z",
    "dateUpdated": "2024-10-22T13:44:05.548Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T09:05:45.851Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-20563\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-15T17:15:29.685693Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:amd:ryzen_5000_series_desktop_processors_with_radeon_graphics:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_5000_series_desktop_processors_with_radeon_graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"ComboAM4V2 1.2.0.B *(2023-08-25)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_7000_series_desktop_processors:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_7000_series_desktop_processors\", \"versions\": [{\"status\": \"affected\", \"version\": \"ComboAM5 1.0.7.0 (2023-04-18)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_5000_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_5000_series_mobile_processors_with_radeon_graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"CezannePI-FP6 1.0.0.F (2023-06-20)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_6000_series_processors_with_radeon_graphics:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_6000_series_processors_with_radeon_graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"RembrandtPI-FP7 1.0.0.9 (2023-05-16)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_7035_series_processors_with_radeon_graphics:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_7035_series_processors_with_radeon_graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"RembrandtPI-FP7 1.0.0.9 (2023-05-16)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_5000_series_processors_with_radeon_graphics:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_5000_series_processors_with_radeon_graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"CezannePI-FP6 1.0.0.F (2023-06-20)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_7030_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_7030_series_mobile_processors_with_radeon_graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"CezannePI-FP6 1.0.0.F (2023-06-20)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_7040_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_7040_series_mobile_processors_with_radeon_graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"PhoenixPI-FP8-FP7 PI 1.0.0.1g (2023-05-11)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_embedded_r1000\", \"versions\": [{\"status\": \"affected\", \"version\": \"EmbeddedPI-FP5 1.2.0.A (2023-07-31)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_embedded_r2000\", \"versions\": [{\"status\": \"affected\", \"version\": \"EmbeddedPI-FP5 1.0.0.2 (2023-07-31)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_embedded_5000:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_embedded_5000\", \"versions\": [{\"status\": \"affected\", \"version\": \"EmbAM4PI 1.0.0.3 (2023-07-31)\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_embedded_v3000:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_embedded_v3000\", \"versions\": [{\"status\": \"affected\", \"version\": \"EmbeddedPI-FP7r2 1.0.0.6 (2023-09-15)\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-21T18:04:40.401Z\"}}], \"cna\": {\"source\": {\"advisory\": \"AMD-SB-4002, AMD-SB-5001\", \"discovery\": \"UNKNOWN\"}, \"affected\": [{\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 5000 Series Desktop Processor with Radeon\\u2122 Graphics  \\u201cCezanne\\u201d\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"x86\"], \"packageName\": \"PI\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 7000 Series Desktop Processors \\u201cRaphael\\u201d XD3\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"x86\"], \"packageName\": \"PI\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 5000 Series Mobile Processors with Radeon\\u2122 Graphics \\u201cCezanne\\u201d\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"x86\"], \"packageName\": \"PI\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 6000 Series Processors with Radeon\\u2122 Graphics \\\"Rembrandt\\\"\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"x86\"], \"packageName\": \"PI\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 7035 Series Processors with Radeon\\u2122 Graphics \\u201cRembrandt-R\\u201d\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"x86\"], \"packageName\": \"PI\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 5000 Series Processors with Radeon\\u2122 Graphics  \\u201cBarcelo\\u201d\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"x86\"], \"packageName\": \"PI\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 7030 Series Mobile Processors with Radeon\\u2122 Graphics \\u201cBarcelo-R\\u201d\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"x86\"], \"packageName\": \"PI\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 7040 Series Mobile Processors with Radeon\\u2122 Graphics \\u201cPhoenix\\u201d FP7/FP7r2/FP8\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"x86\"], \"packageName\": \"PI\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122  Embedded R1000\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122  Embedded R2000\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122  Embedded 5000\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122  Embedded V3000\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2023-11-14T17:30:00.000Z\", \"references\": [{\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.\\n\\n\\n\\n\\n\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.\\n\\n\\n\\n\\n\\n\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"shortName\": \"AMD\", \"dateUpdated\": \"2024-02-13T19:27:18.318Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-20563\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-22T13:44:05.548Z\", \"dateReserved\": \"2022-10-27T18:53:39.747Z\", \"assignerOrgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"datePublished\": \"2023-11-14T18:54:41.308Z\", \"assignerShortName\": \"AMD\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…