CVE-2023-31347

CWE-682CWE-1685 documents5 sources
Severity
4.9MEDIUM
EPSS
0.0%
top 86.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 13

Description

Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC is enabled potentially resulting in a loss of guest integrity.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:NExploitability: 1.2 | Impact: 3.6

Affected Packages63 packages

NVDamd/epyc_7203_firmware< milanpi_1.0.0.c
NVDamd/epyc_72f3_firmware< milanpi_1.0.0.c
NVDamd/epyc_7303_firmware< milanpi_1.0.0.c
NVDamd/epyc_7313_firmware< milanpi_1.0.0.c
NVDamd/epyc_7343_firmware< milanpi_1.0.0.c

🔴Vulnerability Details

3
CVEList
CVE-2023-31347: Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC2024-02-13
GHSA
GHSA-ggv6-7vfj-r2fw: Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC2024-02-13
OSV
CVE-2023-31347: Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC2024-02-13

📋Vendor Advisories

1
Red Hat
kernel: Insufficient check may lead to an incorrect TSC2023-12-19
CVE-2023-31347 (MEDIUM CVSS 4.9) | Due to a code bug in Secure_TSC | cvebase.io