Vulnerability Details : CVE-2023-20569
Potential exploit
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
Vulnerability category: Information leak
Products affected by CVE-2023-20569
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_7735hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_7736u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_7735u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_7535hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_7535u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_7335u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_pro_7640hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_7940h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_7840h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_7840u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_7640h_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_7640u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_7540u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3_7440u_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_7945hx3d_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_7945hx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_9_7845hx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_7_7745hx_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5_7645hx_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-20569
0.65%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 70 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-20569
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.7
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.0
|
3.6
|
NIST |
CWE ids for CVE-2023-20569
-
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-20569
-
https://security.netapp.com/advisory/ntap-20240605-0006/
CVE-2023-20569 Debian Vulnerability in NetApp Products | NetApp Product Security
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
[SECURITY] Fedora 37 Update: xen-4.16.5-1.fc37 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2023/08/08/4
oss-security - Xen Security Advisory 434 v1 (CVE-2023-20569) - x86/AMD: Speculative Return Stack OverflowMailing List
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/
[SECURITY] Fedora 38 Update: kernel-6.4.9-200.fc38 - package-announce - Fedora Mailing-ListsMailing List
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/
[SECURITY] Fedora 37 Update: kernel-6.4.9-100.fc37 - package-announce - Fedora Mailing-ListsMailing List
-
https://www.debian.org/security/2023/dsa-5475
Debian -- Security Information -- DSA-5475-1 linuxThird Party Advisory
-
http://xenbits.xen.org/xsa/advisory-434.html
XSA-434 - Xen Security AdvisoriesThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
[SECURITY] [DLA 3525-1] linux-5.10 security updateMailing List
-
https://comsec.ethz.ch/research/microarch/inception/
Inception: how a simple XOR can cause a Microarchitectural Stack Overflow - Computer Security GroupExploit;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
[SECURITY] Fedora 38 Update: xen-4.17.2-1.fc38 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005
Return Address Security BulletinVendor Advisory
Jump to