Vulnerability identifier: #VU65122
Vulnerability risk: Low
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
1st Gen AMD EPYC Processors
Hardware solutions /
Firmware
2nd Gen AMD EPYC Processors
Hardware solutions /
Firmware
3rd Gen AMD EPYC Processors
Hardware solutions /
Firmware
AMD EPYC Embedded Processors
Hardware solutions /
Firmware
Vendor: AMD
Description
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a Ciphertext side channel attack on ECC and DH operations in the Secure Encrypted Virtualization with Encrypted State (SEV-ES)
and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local user with control over hypervisor can obtain sensitive data from the guest OS.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
1st Gen AMD EPYC Processors: All versions
2nd Gen AMD EPYC Processors: All versions
3rd Gen AMD EPYC Processors: All versions
AMD EPYC Embedded Processors: All versions
CPE
External links
http://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?