fkie_cve-2022-23818
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2025-01-28 16:15
Summary
Insufficient input validation on the model specific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest memory integrity.
Impacted products
Vendor Product Version
amd epyc_72f3_firmware milanpi_1.0.0.9
amd epyc_72f3 -
amd epyc_7313_firmware milanpi_1.0.0.9
amd epyc_7313 -
amd epyc_7313p_firmware milanpi_1.0.0.9
amd epyc_7313p -
amd epyc_7343_firmware milanpi_1.0.0.9
amd epyc_7343 -
amd epyc_7373x_firmware milanpi_1.0.0.9
amd epyc_7373x -
amd epyc_73f3_firmware milanpi_1.0.0.9
amd epyc_73f3 -
amd epyc_7413_firmware milanpi_1.0.0.9
amd epyc_7413 -
amd epyc_7443_firmware milanpi_1.0.0.9
amd epyc_7443 -
amd epyc_7443p_firmware milanpi_1.0.0.9
amd epyc_7443p -
amd epyc_7453_firmware milanpi_1.0.0.9
amd epyc_7453 -
amd epyc_7473x_firmware milanpi_1.0.0.9
amd epyc_7473x -
amd epyc_74f3_firmware milanpi_1.0.0.9
amd epyc_74f3 -
amd epyc_7513_firmware milanpi_1.0.0.9
amd epyc_7513 -
amd epyc_7543_firmware milanpi_1.0.0.9
amd epyc_7543 -
amd epyc_7543p_firmware milanpi_1.0.0.9
amd epyc_7543p -
amd epyc_7573x_firmware milanpi_1.0.0.9
amd epyc_7573x -
amd epyc_75f3_firmware milanpi_1.0.0.9
amd epyc_75f3 -
amd epyc_7643_firmware milanpi_1.0.0.9
amd epyc_7643 -
amd epyc_7663_firmware milanpi_1.0.0.9
amd epyc_7663 -
amd epyc_7713_firmware milanpi_1.0.0.9
amd epyc_7713 -
amd epyc_7713p_firmware milanpi_1.0.0.9
amd epyc_7713p -
amd epyc_7763_firmware milanpi_1.0.0.9
amd epyc_7763 -
amd epyc_7773x_firmware milanpi_1.0.0.9
amd epyc_7773x -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient input validation on the model\nspecific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest\nmemory integrity.\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
    }
  ],
  "id": "CVE-2022-23818",
  "lastModified": "2025-01-28T16:15:33.747",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-05-09T19:15:11.367",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…