#VU79173 Security features bypass in AMD products - CVE-2023-20589

 

#VU79173 Security features bypass in AMD products - CVE-2023-20589

Published: August 8, 2023


Vulnerability identifier: #VU79173
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-20589
CWE-ID: CWE-254
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
AMD Ryzen 3000 Series Desktop processors
AMD Ryzen PRO 3000 Series Desktop Processors
AMD Ryzen 3000 Series Desktop Processors with Radeon Graphics
AMD Ryzen PRO 3000 Series Processors with Radeon Vega Graphics
AMD Athlon 3000 Series Processors with Radeon Graphics
AMD Athlon PRO 3000 Series Processors with Radeon Vega Graphics
AMD Ryzen 4000 Series Desktop processors with Radeon graphics
AMD Ryzen PRO 4000 Series Desktop Processors
AMD Ryzen 5000 Series Desktop Processors
AMD Ryzen 5000 Series Desktop Processors with Radeon Graphics
AMD Ryzen PRO 5000 Series Desktop Processors
AMD Ryzen Threadripper 2000 Series Processors
AMD Ryzen Threadripper 5000 Series Processors
AMD Ryzen Threadripper 3000 Series Processors
AMD Athlon 3000 Series Mobile processors with Radeon Graphics
AMD Ryzen 5000 Series Processors with Radeon Graphics
AMD Ryzen PRO 5000 Series Processors
AMD Ryzen 6000 Series Processors with Radeon Graphics
AMD Ryzen PRO 6000 Series Processors
AMD Ryzen 7020 Series Processors with Radeon Graphics
AMD Ryzen 7030 Series Processors with Radeon Graphics
AMD Ryzen PRO 7030 Series Processors
AMD Ryzen 7035 Series Processors with Radeon Graphics
Software vendor:
AMD

Description

The vulnerability allows an attacker to escalate privileges on the system.

The vulnerability exists due to the way ASP secure boot is implemented. An attacker with physical access to device can use specialized hardware to perform a voltage fault injection attack, compromise the ASP secure boot and execute arbitrary code on the system.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links