787 119
Advisory Published

CVE-2023-20520: Buffer Overflow

First published: Tue May 09 2023(Updated: )

Improper access control settings in ASP Bootloader may allow an attacker to corrupt the return address causing a stack-based buffer overrun potentially leading to arbitrary code execution.


Affected SoftwareAffected VersionHow to fix
Amd Epyc 72f3 Firmware=milanpi_1.0.0.5
Amd Epyc 72f3
Amd Epyc 7313 Firmware=milanpi_1.0.0.5
Amd Epyc 7313
Amd Epyc 7313p Firmware=milanpi_1.0.0.5
Amd Epyc 7313p
Amd Epyc 7343 Firmware=milanpi_1.0.0.5
Amd Epyc 7343
Amd Epyc 7373x Firmware=milanpi_1.0.0.5
Amd Epyc 7373x
Amd Epyc 73f3 Firmware=milanpi_1.0.0.5
Amd Epyc 73f3
Amd Epyc 7413 Firmware=milanpi_1.0.0.5
Amd Epyc 7413
Amd Epyc 7443 Firmware=milanpi_1.0.0.5
Amd Epyc 7443
Amd Epyc 7443p Firmware=milanpi_1.0.0.5
Amd Epyc 7443p
Amd Epyc 7453 Firmware=milanpi_1.0.0.5
Amd Epyc 7453
Amd Epyc 7473x Firmware=milanpi_1.0.0.5
Amd Epyc 7473x
Amd Epyc 74f3 Firmware=milanpi_1.0.0.5
Amd Epyc 74f3
Amd Epyc 7513 Firmware=milanpi_1.0.0.5
Amd Epyc 7513
Amd Epyc 7543 Firmware=milanpi_1.0.0.5
Amd Epyc 7543
Amd Epyc 7543p Firmware=milanpi_1.0.0.5
Amd Epyc 7543p
Amd Epyc 7573x Firmware=milanpi_1.0.0.5
Amd Epyc 7573x
Amd Epyc 75f3 Firmware=milanpi_1.0.0.5
Amd Epyc 75f3
Amd Epyc 7643 Firmware=milanpi_1.0.0.5
Amd Epyc 7643
Amd Epyc 7663 Firmware=milanpi_1.0.0.5
Amd Epyc 7663
Amd Epyc 7713 Firmware=milanpi_1.0.0.5
Amd Epyc 7713
Amd Epyc 7713p Firmware=milanpi_1.0.0.5
Amd Epyc 7713p
Amd Epyc 7763 Firmware=milanpi_1.0.0.5
Amd Epyc 7763
Amd Epyc 7773x Firmware=milanpi_1.0.0.5
Amd Epyc 7773x
Amd Epyc 7232p Firmware=romepi_1.0.0.d
Amd Epyc 7232p
Amd Epyc 7252 Firmware=romepi_1.0.0.d
Amd Epyc 7252
Amd Epyc 7262 Firmware=romepi_1.0.0.d
Amd Epyc 7262
Amd Epyc 7272 Firmware=romepi_1.0.0.d
Amd Epyc 7272
Amd Epyc 7282 Firmware=romepi_1.0.0.d
Amd Epyc 7282
Amd Epyc 7302 Firmware=romepi_1.0.0.d
Amd Epyc 7302
Amd Epyc 7302p Firmware=romepi_1.0.0.d
Amd Epyc 7302p
Amd Epyc 7352 Firmware=romepi_1.0.0.d
Amd Epyc 7352
Amd Epyc 7402 Firmware=romepi_1.0.0.d
Amd Epyc 7402
Amd Epyc 7402p Firmware=romepi_1.0.0.d
Amd Epyc 7402p
Amd Epyc 7452 Firmware=romepi_1.0.0.d
Amd Epyc 7452
Amd Epyc 7502 Firmware=romepi_1.0.0.d
Amd Epyc 7502
Amd Epyc 7502p Firmware=romepi_1.0.0.d
Amd Epyc 7502p
Amd Epyc 7532 Firmware=romepi_1.0.0.d
Amd Epyc 7532
Amd Epyc 7542 Firmware=romepi_1.0.0.d
Amd Epyc 7542
Amd Epyc 7552 Firmware=romepi_1.0.0.d
Amd Epyc 7552
Amd Epyc 7642 Firmware=romepi_1.0.0.d
Amd Epyc 7642
Amd Epyc 7662 Firmware=romepi_1.0.0.d
Amd Epyc 7662
Amd Epyc 7702 Firmware=romepi_1.0.0.d
Amd Epyc 7702
Amd Epyc 7702p Firmware=romepi_1.0.0.d
Amd Epyc 7702p
Amd Epyc 7742 Firmware=romepi_1.0.0.d
Amd Epyc 7742
Amd Epyc 7f32 Firmware=romepi_1.0.0.d
Amd Epyc 7f32
Amd Epyc 7f52 Firmware=romepi_1.0.0.d
Amd Epyc 7f52
Amd Epyc 7f72 Firmware=romepi_1.0.0.d
Amd Epyc 7f72
Amd Epyc 7h12 Firmware=romepi_1.0.0.d
Amd Epyc 7h12
Amd Epyc 7251 Firmware=naplespi_1.0.0.h
Amd Epyc 7251
Amd Epyc 7261 Firmware=naplespi_1.0.0.h
Amd Epyc 7261
Amd Epyc 7281 Firmware=naplespi_1.0.0.h
Amd Epyc 7281
Amd Epyc 7301 Firmware=naplespi_1.0.0.h
Amd Epyc 7301
Amd Epyc 7351 Firmware=naplespi_1.0.0.h
Amd Epyc 7351
Amd Epyc 7351p Firmware=naplespi_1.0.0.h
Amd Epyc 7351p
Amd Epyc 7371 Firmware=naplespi_1.0.0.h
Amd Epyc 7371
Amd Epyc 7401 Firmware=naplespi_1.0.0.h
Amd Epyc 7401
Amd Epyc 7401p Firmware=naplespi_1.0.0.h
Amd Epyc 7401p
Amd Epyc 7451 Firmware=naplespi_1.0.0.h
Amd Epyc 7451
Amd Epyc 7501 Firmware=naplespi_1.0.0.h
Amd Epyc 7501
Amd Epyc 7551 Firmware=naplespi_1.0.0.h
Amd Epyc 7551
Amd Epyc 7551p Firmware=naplespi_1.0.0.h
Amd Epyc 7551p
Amd Epyc 7571 Firmware=naplespi_1.0.0.h
Amd Epyc 7571
Amd Epyc 7601 Firmware=naplespi_1.0.0.h
Amd Epyc 7601

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-20520 vulnerability about?

    The CVE-2023-20520 vulnerability is about improper access control settings in ASP Bootloader that may allow an attacker to corrupt the return address causing a stack-based buffer overrun potentially leading to arbitrary code execution.

  • What is the severity level of CVE-2023-20520?

    The severity level of CVE-2023-20520 is critical with a CVSS score of 9.8.

  • Which software is affected by CVE-2023-20520?

    The affected software by CVE-2023-20520 includes Amd Epyc 72f3, Amd Epyc 7313, Amd Epyc 7343, and more with specific firmware versions.

  • How can I fix CVE-2023-20520 vulnerability?

    To fix the CVE-2023-20520 vulnerability, it is recommended to apply the security updates provided by the software vendor.

  • Where can I find more information about CVE-2023-20520?

    More information about CVE-2023-20520 can be found at the AMD Product Security Bulletin link:


SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203