First published: Tue Jan 10 2023(Updated: )
TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.
Credit: psirt@amd.com
Affected Software | Affected Version | How to fix |
---|---|---|
AMD EPYC 7H12 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7H12 | ||
AMD EPYC 7F72 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7F72 | ||
AMD EPYC 7F52 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7F52 | ||
AMD EPYC 7F32 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7F32 Firmware | ||
AMD EPYC 7742 firmware | <romepi_1.0.0.c | |
AMD EPYC 7742 firmware | ||
AMD EPYC 7702 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7702p | ||
AMD EPYC 7702 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7702 | ||
AMD EPYC 7662 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7662 | ||
AMD EPYC 7642 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7642 Firmware | ||
AMD EPYC 7552 Firmware | <romepi_1.0.0.c | |
AMD EPYC Embedded 7552 | ||
AMD EPYC 7542 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7542 | ||
AMD EPYC 7532 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7532 | ||
AMD EPYC 7502P Firmware | <romepi_1.0.0.c | |
AMD EPYC 7502P | ||
Amd Epyc Server Firmware | <romepi_1.0.0.c | |
AMD EPYC 7502 | ||
AMD EPYC 7452 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7452 | ||
Amd Epyc Server Firmware | <romepi_1.0.0.c | |
AMD EPYC 7402 | ||
AMD EPYC 7402P Firmware | <romepi_1.0.0.c | |
AMD EPYC 7402P | ||
AMD EPYC 7352 firmware | <romepi_1.0.0.c | |
AMD EPYC 7352 | ||
AMD EPYC 7302P Firmware | <romepi_1.0.0.c | |
AMD EPYC 7302P | ||
Amd Epyc Server Firmware | <romepi_1.0.0.c | |
AMD EPYC 7302P | ||
AMD EPYC 7282 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7282 | ||
AMD EPYC 7272 firmware | <romepi_1.0.0.c | |
AMD EPYC 7272 firmware | ||
AMD EPYC 7262 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7262 Firmware | ||
AMD EPYC 7252 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7252 Firmware | ||
AMD EPYC 7232p firmware | <romepi_1.0.0.c | |
AMD EPYC 7232p firmware | ||
AMD EPYC 7002 Firmware | <romepi_1.0.0.c | |
AMD EPYC 7002 | ||
Amd Epyc Server Firmware | <milanpi_1.0.0.5 | |
amd epyc 7003 | ||
AMD EPYC 72F3 Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 72F3 Firmware | ||
Amd Epyc Server Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7313P | ||
AMD EPYC 7313P Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7313P | ||
Amd Epyc Server Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7343 | ||
AMD EPYC 7373X Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7373X | ||
AMD EPYC 73F3 Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 73F3 | ||
AMD EPYC 7413 Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7413 Firmware | ||
AMD EPYC 7443 Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7443 | ||
AMD EPYC 7443P Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7443P | ||
Amd Epyc Server Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7453 | ||
AMD EPYC 74F3 Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 74F3 | ||
AMD EPYC 7513 Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7513 | ||
Amd Epyc Server Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7543 Firmware | ||
AMD EPYC 7543P Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7543P Firmware | ||
AMD EPYC 7573X Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7573X | ||
AMD EPYC 75F3 Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 75F3 | ||
AMD EPYC 7643 Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7643 | ||
AMD EPYC 7663 Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7663 Firmware | ||
AMD EPYC 7713P Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7713 | ||
AMD EPYC 7713P Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7713P Firmware | ||
Amd Epyc Server Firmware | <milanpi_1.0.0.5 | |
amd epyc 7743 | ||
AMD EPYC 7763 Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7763 Firmware | ||
AMD EPYC 7773X Firmware | <milanpi_1.0.0.5 | |
AMD EPYC 7773X |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20523 has been classified with a severity that may lead to loss of integrity or denial of service due to TOCTOU conditions.
To resolve CVE-2023-20523, update the AMD firmware to the version containing the security patches addressing this vulnerability.
CVE-2023-20523 affects various AMD EPYC firmware versions, notably those prior to specific updated versions like romepi_1.0.0.c and milanpi_1.0.0.5.
TOCTOU stands for Time-of-check to time-of-use vulnerabilities, which in the context of CVE-2023-20523, allows potential manipulation of buffer bounds.
Yes, CVE-2023-20523 has the potential to result in data breaches through loss of integrity if exploited by an attacker.