4.7
MEDIUM
CVE-2023-20569
AMD CPU Spectre-Like Information Disclosure Attack
Description

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

INFO

Published Date :

Aug. 8, 2023, 6:15 p.m.

Last Modified :

Nov. 21, 2024, 7:41 a.m.

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

1.0
Public PoC/Exploit Available at Github

CVE-2023-20569 has a 2 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2023-20569 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Amd epyc_72f3_firmware
2 Amd epyc_7313_firmware
3 Amd epyc_7313p_firmware
4 Amd epyc_7343_firmware
5 Amd epyc_7373x_firmware
6 Amd epyc_73f3_firmware
7 Amd epyc_7413_firmware
8 Amd epyc_7443_firmware
9 Amd epyc_7443p_firmware
10 Amd epyc_7453_firmware
11 Amd epyc_74f3_firmware
12 Amd epyc_7513_firmware
13 Amd epyc_7543_firmware
14 Amd epyc_7543p_firmware
15 Amd epyc_7573x_firmware
16 Amd epyc_75f3_firmware
17 Amd epyc_7643_firmware
18 Amd epyc_7663_firmware
19 Amd epyc_7713_firmware
20 Amd epyc_7713p_firmware
21 Amd epyc_7763_firmware
22 Amd epyc_7773x_firmware
23 Amd ryzen_3_5125c_firmware
24 Amd ryzen_3_5300g_firmware
25 Amd ryzen_3_5300ge_firmware
26 Amd ryzen_3_5300u_firmware
27 Amd ryzen_3_5400u_firmware
28 Amd ryzen_3_5425u_firmware
29 Amd ryzen_5_5500_firmware
30 Amd ryzen_5_5500u_firmware
31 Amd ryzen_5_5560u_firmware
32 Amd ryzen_5_5600_firmware
33 Amd ryzen_5_5600g_firmware
34 Amd ryzen_5_5600ge_firmware
35 Amd ryzen_5_5600h_firmware
36 Amd ryzen_5_5600hs_firmware
37 Amd ryzen_5_5600u_firmware
38 Amd ryzen_5_5600x_firmware
39 Amd ryzen_5_5625u_firmware
40 Amd ryzen_7_5700g_firmware
41 Amd ryzen_7_5700ge_firmware
42 Amd ryzen_7_5700u_firmware
43 Amd ryzen_7_5700x_firmware
44 Amd ryzen_7_5800_firmware
45 Amd ryzen_7_5800h_firmware
46 Amd ryzen_7_5800hs_firmware
47 Amd ryzen_7_5800u_firmware
48 Amd ryzen_7_5800x_firmware
49 Amd ryzen_7_5800x3d_firmware
50 Amd ryzen_7_5825u_firmware
51 Amd ryzen_9_5900_firmware
52 Amd ryzen_9_5900hs_firmware
53 Amd ryzen_9_5900hx_firmware
54 Amd ryzen_9_5900x_firmware
55 Amd ryzen_9_5950x_firmware
56 Amd ryzen_9_5980hs_firmware
57 Amd ryzen_9_5980hx_firmware
58 Amd ryzen_threadripper_pro_5945wx_firmware
59 Amd ryzen_threadripper_pro_5955wx_firmware
60 Amd ryzen_threadripper_pro_5965wx_firmware
61 Amd ryzen_threadripper_pro_5975wx_firmware
62 Amd ryzen_threadripper_pro_5995wx_firmware
63 Amd epyc_7473x_firmware
64 Amd ryzen_5_5600x3d_firmware
65 Amd ryzen_9_pro_5945_firmware
66 Amd ryzen_7_pro_5845_firmware
67 Amd ryzen_5_pro_5645_firmware
68 Amd ryzen_7_5700_firmware
69 Amd ryzen_3_5100_firmware
70 Amd ryzen_9_7950x3d_firmware
71 Amd ryzen_9_7950x_firmware
72 Amd ryzen_9_7900x3d_firmware
73 Amd ryzen_9_7900x_firmware
74 Amd ryzen_9_7900_firmware
75 Amd ryzen_9_pro_7945_firmware
76 Amd ryzen_7_7800x3d_firmware
77 Amd ryzen_7_7700x_firmware
78 Amd ryzen_7_7700_firmware
79 Amd ryzen_7_pro_7745_firmware
80 Amd ryzen_5_7600x_firmware
81 Amd ryzen_5_7600_firmware
82 Amd ryzen_5_pro_7645_firmware
83 Amd ryzen_5_7500f_firmware
84 Amd ryzen_9_6980hx_firmware
85 Amd ryzen_9_6980hs_firmware
86 Amd ryzen_9_6900hx_firmware
87 Amd ryzen_9_6900hs_firmware
88 Amd ryzen_7_6800h_firmware
89 Amd ryzen_7_6800hs_firmware
90 Amd ryzen_7_6800u_firmware
91 Amd ryzen_5_6600h_firmware
92 Amd ryzen_5_6600hs_firmware
93 Amd ryzen_5_6600u_firmware
94 Amd ryzen_7_pro_7730u_firmware
95 Amd ryzen_5_pro_7530u_firmware
96 Amd ryzen_3_pro_7330u_firmware
97 Amd epyc_9124_firmware
98 Amd epyc_9174f_firmware
99 Amd epyc_9184x_firmware
100 Amd epyc_9224_firmware
101 Amd epyc_9254_firmware
102 Amd epyc_9274f_firmware
103 Amd epyc_9334_firmware
104 Amd epyc_9354_firmware
105 Amd epyc_9354p_firmware
106 Amd epyc_9374f_firmware
107 Amd epyc_9384x_firmware
108 Amd epyc_9454_firmware
109 Amd epyc_9454p_firmware
110 Amd epyc_9474f_firmware
111 Amd epyc_9534_firmware
112 Amd epyc_9554p_firmware
113 Amd epyc_9554_firmware
114 Amd epyc_9634_firmware
115 Amd epyc_9654_firmware
116 Amd epyc_9654p_firmware
117 Amd epyc_9684x_firmware
118 Amd epyc_9734_firmware
119 Amd epyc_9754_firmware
120 Amd epyc_9754s_firmware
121 Amd ryzen_7_7735hs_firmware
122 Amd ryzen_7_7736u_firmware
123 Amd ryzen_7_7735u_firmware
124 Amd ryzen_5_7535hs_firmware
125 Amd ryzen_5_7535u_firmware
126 Amd ryzen_3_7335u_firmware
127 Amd ryzen_9_pro_7640hs_firmware
128 Amd ryzen_9_7940h_firmware
129 Amd ryzen_7_pro_7840hs_firmware
130 Amd ryzen_7_7840h_firmware
131 Amd ryzen_7_7840u_firmware
132 Amd ryzen_5_pro_7640hs_firmware
133 Amd ryzen_5_7640h_firmware
134 Amd ryzen_5_7640u_firmware
135 Amd ryzen_5_7540u_firmware
136 Amd ryzen_3_7440u_firmware
137 Amd ryzen_9_7945hx3d_firmware
138 Amd ryzen_9_7945hx_firmware
139 Amd ryzen_9_7845hx_firmware
140 Amd ryzen_7_7745hx_firmware
141 Amd ryzen_5_7645hx_firmware
142 Amd epyc_72f3
143 Amd epyc_7313
144 Amd epyc_7313p
145 Amd epyc_7343
146 Amd epyc_73f3
147 Amd epyc_7413
148 Amd epyc_7443
149 Amd epyc_7443p
150 Amd epyc_7453
151 Amd epyc_74f3
152 Amd epyc_7513
153 Amd epyc_7543
154 Amd epyc_7543p
155 Amd epyc_75f3
156 Amd epyc_7643
157 Amd epyc_7663
158 Amd epyc_7713
159 Amd epyc_7713p
160 Amd epyc_7763
161 Amd ryzen_5_7600x
162 Amd ryzen_9_5950x
163 Amd ryzen_9_5900x
164 Amd ryzen_9_5900
165 Amd ryzen_9_pro_5945
166 Amd ryzen_7_5800x3d
167 Amd ryzen_7_5800x
168 Amd ryzen_7_5800
169 Amd ryzen_7_5700x
170 Amd ryzen_7_pro_5845
171 Amd ryzen_5_5600x3d
172 Amd ryzen_5_5600x
173 Amd ryzen_5_5600
174 Amd ryzen_5_pro_5645
175 Amd ryzen_7_5700
176 Amd ryzen_5_5500
177 Amd ryzen_3_5100
178 Amd ryzen_7_5700g
179 Amd ryzen_7_5700ge
180 Amd ryzen_5_5600g
181 Amd ryzen_5_5600ge
182 Amd ryzen_3_5300g
183 Amd ryzen_3_5300ge
184 Amd ryzen_9_7950x3d
185 Amd ryzen_9_7950x
186 Amd ryzen_9_7900x3d
187 Amd ryzen_9_7900x
188 Amd ryzen_9_7900
189 Amd ryzen_9_pro_7945
190 Amd ryzen_7_7800x3d
191 Amd ryzen_7_7700x
192 Amd ryzen_7_7700
193 Amd ryzen_7_pro_7745
194 Amd ryzen_5_7600
195 Amd ryzen_5_pro_7645
196 Amd ryzen_5_7500f
197 Amd ryzen_threadripper_pro_5995wx
198 Amd ryzen_threadripper_pro_5975wx
199 Amd ryzen_threadripper_pro_5965wx
200 Amd ryzen_threadripper_pro_5955wx
201 Amd ryzen_threadripper_pro_5945wx
202 Amd ryzen_7_5700u
203 Amd ryzen_5_5500u
204 Amd ryzen_3_5300u
205 Amd ryzen_9_5980hx
206 Amd ryzen_9_5980hs
207 Amd ryzen_9_5900hx
208 Amd ryzen_9_5900hs
209 Amd ryzen_7_5800h
210 Amd ryzen_7_5800hs
211 Amd ryzen_7_5825u
212 Amd ryzen_7_5800u
213 Amd ryzen_5_5600h
214 Amd ryzen_5_5600hs
215 Amd ryzen_5_5625u
216 Amd ryzen_5_5600u
217 Amd ryzen_5_5560u
218 Amd ryzen_3_5425u
219 Amd ryzen_3_5400u
220 Amd ryzen_3_5125c
221 Amd ryzen_9_6980hx
222 Amd ryzen_9_6980hs
223 Amd ryzen_9_6900hx
224 Amd ryzen_9_6900hs
225 Amd ryzen_7_6800h
226 Amd ryzen_7_6800hs
227 Amd ryzen_7_6800u
228 Amd ryzen_5_6600h
229 Amd ryzen_5_6600hs
230 Amd ryzen_5_6600u
231 Amd ryzen_7_7735hs
232 Amd ryzen_7_7736u
233 Amd ryzen_7_7735u
234 Amd ryzen_5_7535hs
235 Amd ryzen_5_7535u
236 Amd ryzen_3_7335u
237 Amd ryzen_7_pro_7730u
238 Amd ryzen_5_pro_7530u
239 Amd ryzen_3_pro_7330u
240 Amd ryzen_9_pro_7640hs
241 Amd ryzen_9_7940h
242 Amd ryzen_7_pro_7840hs
243 Amd ryzen_7_7840h
244 Amd ryzen_7_7840u
245 Amd ryzen_5_pro_7640hs
246 Amd ryzen_5_7640h
247 Amd ryzen_5_7640u
248 Amd ryzen_5_7540u
249 Amd ryzen_3_7440u
250 Amd ryzen_9_7945hx3d
251 Amd ryzen_9_7945hx
252 Amd ryzen_9_7845hx
253 Amd ryzen_7_7745hx
254 Amd ryzen_5_7645hx
255 Amd epyc_7773x
256 Amd epyc_7573x
257 Amd epyc_7473x
258 Amd epyc_7373x
259 Amd epyc_9124
260 Amd epyc_9224
261 Amd epyc_9254
262 Amd epyc_9334
263 Amd epyc_9354
264 Amd epyc_9354p
265 Amd epyc_9174f
266 Amd epyc_9184x
267 Amd epyc_9274f
268 Amd epyc_9374f
269 Amd epyc_9384x
270 Amd epyc_9474f
271 Amd epyc_9454
272 Amd epyc_9454p
273 Amd epyc_9534
274 Amd epyc_9554
275 Amd epyc_9554p
276 Amd epyc_9634
277 Amd epyc_9654
278 Amd epyc_9654p
279 Amd epyc_9684x
280 Amd epyc_9734
281 Amd epyc_9754s
282 Amd epyc_9754
1 Microsoft windows_server_2008
2 Microsoft windows_server_2012
3 Microsoft windows_server_2016
4 Microsoft windows_server_2019
5 Microsoft windows_10_1607
6 Microsoft windows_10_1809
7 Microsoft windows_10_21h2
8 Microsoft windows_10_22h2
9 Microsoft windows_server_2022
10 Microsoft windows_11_21h2
11 Microsoft windows_11_22h2
12 Microsoft windows_10_1507
1 Fedoraproject fedora
1 Debian debian_linux
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-20569.

URL Resource
http://www.openwall.com/lists/oss-security/2023/08/08/4 Mailing List
http://xenbits.xen.org/xsa/advisory-434.html Third Party Advisory
https://comsec.ethz.ch/research/microarch/inception/ Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/ Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/ Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20240605-0006/
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005 Vendor Advisory
https://www.debian.org/security/2023/dsa-5475 Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/08/08/4 Mailing List
http://xenbits.xen.org/xsa/advisory-434.html Third Party Advisory
https://comsec.ethz.ch/research/microarch/inception/ Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/ Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/ Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20240605-0006/
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005 Vendor Advisory
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html
https://www.debian.org/security/2023/dsa-5475 Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Archived EGI SVG Advisories

Updated: 2 weeks, 3 days ago
1 stars 1 fork 1 watcher
Born at : Oct. 8, 2021, 2:26 p.m. This repo has been linked 29 different CVEs too.

Reptar, Downfall, Zenbleed, ZombieLoad, RIDL, Fallout, Foreshadow, Spectre, Meltdown vulnerability/mitigation checker for Linux & BSD

mitigation meltdown spectre cve-2017-5753 cve-2017-5715 cve-2017-5754 cve-2018-3640 cve-2018-3639 foreshadow cve-2018-3615 cve-2018-3620 cve-2018-3646 zombieload cve-2019-11135 downfall reptar

Shell Dockerfile

Updated: 2 weeks, 4 days ago
3876 stars 465 fork 465 watcher
Born at : Jan. 7, 2018, 2 p.m. This repo has been linked 19 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-20569 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-20569 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2023/08/08/4
    Added Reference http://xenbits.xen.org/xsa/advisory-434.html
    Added Reference https://comsec.ethz.ch/research/microarch/inception/
    Added Reference https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
    Added Reference https://security.netapp.com/advisory/ntap-20240605-0006/
    Added Reference https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005
    Added Reference https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html
    Added Reference https://www.debian.org/security/2023/dsa-5475
  • CVE Modified by [email protected]

    Jun. 10, 2024

    Action Type Old Value New Value
    Added Reference Advanced Micro Devices Inc. https://security.netapp.com/advisory/ntap-20240605-0006/ [No types assigned]
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Apr. 11, 2024

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
  • Modified Analysis by [email protected]

    Apr. 01, 2024

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.
    Added CPE Configuration OR *cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.10240.20107 *cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.14393.6167 *cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.5206 *cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19044.3324 *cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19045.3324 *cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22000.2295 *cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22621.2134 *cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* *cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.14393.6167 *cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.4737 *cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.20348.1906
  • CVE Modified by [email protected]

    Nov. 07, 2023

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
  • Modified Analysis by [email protected]

    Sep. 14, 2023

    Action Type Old Value New Value
    Removed CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    Added CVSS V3.1 NIST AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ Mailing List https://lists.fedoraproject.org/archives/list/[email protected]/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ Mailing List, Third Party Advisory
  • CVE Modified by [email protected]

    Aug. 27, 2023

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ [No Types Assigned]
  • Initial Analysis by [email protected]

    Aug. 21, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type http://www.openwall.com/lists/oss-security/2023/08/08/4 No Types Assigned http://www.openwall.com/lists/oss-security/2023/08/08/4 Mailing List
    Changed Reference Type http://xenbits.xen.org/xsa/advisory-434.html No Types Assigned http://xenbits.xen.org/xsa/advisory-434.html Third Party Advisory
    Changed Reference Type https://comsec.ethz.ch/research/microarch/inception/ No Types Assigned https://comsec.ethz.ch/research/microarch/inception/ Exploit, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html No Types Assigned https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html Mailing List
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/ Mailing List
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/ Mailing List
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ Mailing List
    Changed Reference Type https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005 No Types Assigned https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005 Vendor Advisory
    Changed Reference Type https://www.debian.org/security/2023/dsa-5475 No Types Assigned https://www.debian.org/security/2023/dsa-5475 Third Party Advisory
    Added CWE NIST CWE-203
    Added CPE Configuration OR *cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* *cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_pro_5945_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_9_pro_5945:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_pro_5845_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_7_pro_5845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600x3d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_5_5600x3d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_5645_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_5_pro_5645:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam4v2pi_1.2.0.b OR cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) comboam5_1.0.8.0 OR cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) chagallwspi-swrx8_1.0.0.7 OR cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) chagallwspi-swrx8_1.0.0.7 OR cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) chagallwspi-swrx8_1.0.0.7 OR cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) chagallwspi-swrx8_1.0.0.7 OR cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) chagallwspi-swrx8_1.0.0.7 OR cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_7735hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_7736u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_7735u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_7535hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_7535u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_7335u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) rembrandtpi-fp7_1.0.0.9a OR cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) cezannepi-fp6_1.0.0.fa OR cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_pro_7640hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) phoenixpi-fp8-fp7_1.0.0.2a OR cpe:2.3:h:amd:ryzen_9_pro_7640hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_7940h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) phoenixpi-fp8-fp7_1.0.0.2a OR cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) phoenixpi-fp8-fp7_1.0.0.2a OR cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_7840h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) phoenixpi-fp8-fp7_1.0.0.2a OR cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_7840u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) phoenixpi-fp8-fp7_1.0.0.2a OR cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:*:*:*:*:*:*:*:* versions up to (excluding) phoenixpi-fp8-fp7_1.0.0.2a OR cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_7640h_firmware:*:*:*:*:*:*:*:* versions up to (excluding) phoenixpi-fp8-fp7_1.0.0.2a OR cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_7640u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) phoenixpi-fp8-fp7_1.0.0.2a OR cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_7540u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) phoenixpi-fp8-fp7_1.0.0.2a OR cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_3_7440u_firmware:*:*:*:*:*:*:*:* versions up to (excluding) phoenixpi-fp8-fp7_1.0.0.2a OR cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_7945hx3d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) dragonrangefl1pi_1.0.0.3b OR cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_7945hx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) dragonrangefl1pi_1.0.0.3b OR cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_9_7845hx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) dragonrangefl1pi_1.0.0.3b OR cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_7_7745hx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) dragonrangefl1pi_1.0.0.3b OR cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:ryzen_5_7645hx_firmware:*:*:*:*:*:*:*:* versions up to (excluding) dragonrangefl1pi_1.0.0.3b OR cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) milanpi_1.0.0.c OR cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:* versions up to (excluding) genoapi_1.0.0.9 OR cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Aug. 16, 2023

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 12, 2023

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.
    Added Reference https://www.debian.org/security/2023/dsa-5475 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 11, 2023

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.
    Added Reference https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 10, 2023

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/ [No Types Assigned]
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/ [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 09, 2023

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.
    Added Reference https://comsec.ethz.ch/research/microarch/inception/ [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 08, 2023

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.
    Added Reference http://www.openwall.com/lists/oss-security/2023/08/08/4 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 08, 2023

    Action Type Old Value New Value
    Changed Description A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure. A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled?address, potentially leading to information disclosure.
    Added Reference http://xenbits.xen.org/xsa/advisory-434.html [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-20569 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-20569 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.07 }} 0.01%

score

0.32025

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability