CVE-2023-20566

4 documents4 sources
Severity
7.5HIGH
EPSS
0.1%
top 82.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 14

Description

Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:NExploitability: 0.8 | Impact: 4.0

Affected Packages69 packages

NVDamd/epyc_7203_firmware< milanpi_1.0.0.b
NVDamd/epyc_72f3_firmware< milanpi_1.0.0.b
NVDamd/epyc_7303_firmware< milanpi_1.0.0.b
NVDamd/epyc_7313_firmware< milanpi_1.0.0.b
NVDamd/epyc_7343_firmware< milanpi_1.0.0.b

🔴Vulnerability Details

3
GHSA
GHSA-v2hc-cp84-vjqv: Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity2023-11-14
CVEList
CVE-2023-20566: Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity2023-11-14
OSV
linux-oem-5.14, linux-oem-5.17 vulnerabilities2023-03-03
CVE-2023-20566 (HIGH CVSS 7.5) | Improper address validation in ASP | cvebase.io