Vulnerability Details : CVE-2023-20521
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
Vulnerability category: Denial of service
Products affected by CVE-2023-20521
- cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_3250c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:amd_3015e_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:amd_3015ce_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-20521
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-20521
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.7
|
MEDIUM | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H |
0.5
|
5.2
|
NIST | |
3.3
|
LOW | CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L |
0.3
|
2.7
|
Advanced Micro Devices Inc. | 2024-06-18 |
CWE ids for CVE-2023-20521
-
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-20521
-
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002
AMD Server Vulnerabilities – Nov 2023Vendor Advisory
-
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002
AMD Client Vulnerabilities – November 2023Vendor Advisory
-
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001
AMD Embedded Processors Vulnerabilities – February 2024
Jump to