Vulnerability Details : CVE-2020-12951
Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations.
Products affected by CVE-2020-12951
- cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-12951
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-12951
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | AV:L/AC:M/Au:N/C:P/I:P/A:P |
3.4
|
6.4
|
NIST | |
7.0
|
HIGH | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
NIST |
CWE ids for CVE-2020-12951
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-12951
-
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027
AMD Client Vulnerabilities – May 2022 | AMD
Jump to