First published: Tue Nov 14 2023(Updated: )
A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amd Milanpi Firmware | <1.0.0.a | |
Amd Milanpi | ||
Amd Genoapi Firmware | <1.0.0.3 | |
Amd Genoapi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20519 is a Use-After-Free vulnerability in the management of an SNP guest context page, which may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
The affected software includes Amd Milanpi Firmware versions up to and excluding 1.0.0.a, and Amd Genoapi Firmware versions up to and excluding 1.0.0.3.
CVE-2023-20519 has a severity rating of low, with a CVSS score of 3.3.
A malicious hypervisor can exploit CVE-2023-20519 by masquerading as the guest's migration agent and potentially compromising the integrity of the guest.
Amd Milanpi and Amd Genoapi are not vulnerable to CVE-2023-20519.