Home
MEDIUM: 5.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:NDefault status
affected
GenoaPI_1.0.0.H
unaffected
Default status
affected
MilanPI-SP3_1.0.0.J
unaffected
Default status
affected
TurinPI_1.0.0.8
unaffected
Default status
affected
GenoaPI_1.0.0.H
unaffected
Default status
affected
EmbMilanPI-SP3 1.0.0.D
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.D
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.D
unaffected
Default status
affected
EmbGenoaPI-SP5 1.0.0.D
unaffected
Default status
affected
EmbeddedTurinPI_SP5_1004
unaffected
Description
A missing lock verification in AMD Secure Processor (ASP) firmware may permit a locally authenticated attacker with administrative privileges to alter MMIO routing on some Zen 5-based products, potentially compromising guest system integrity.
Problem types
Product status
GenoaPI_1.0.0.H
MilanPI-SP3_1.0.0.J
TurinPI_1.0.0.8
GenoaPI_1.0.0.H
EmbMilanPI-SP3 1.0.0.D
EmbGenoaPI-SP5 1.0.0.D
EmbGenoaPI-SP5 1.0.0.D
EmbGenoaPI-SP5 1.0.0.D
EmbeddedTurinPI_SP5_1004
References
www.amd.com/...es/product-security/bulletin/AMD-SB-3034.html