cve/2023/CVE-2023-20593.md

34 lines
2.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-20593](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593)
![](https://img.shields.io/static/v1?label=Product&message=2nd%20Gen%20AMD%20EPYC%E2%84%A2%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=3rd%20Gen%20AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20Processors%20%E2%80%9CCastle%20Peak%E2%80%9D%20HEDT&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%204000%20Series%20Desktop%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CRenoir%E2%80%9D%20AM4&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%203000%20Series%20Desktop%20Processors%20%E2%80%9CMatisse%E2%80%9D%20AM4&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%204000%20Series%20Mobile%20processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CRenoir%E2%80%9D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%205000%20Series%20Mobile%20processors%20with%20Radeon%E2%84%A2%20Graphics%20%E2%80%9CLucienne%E2%80%9D&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%207020%20Series%20processors%20%E2%80%9CMendocino%E2%80%9D%20FT6&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20PRO%20Processors%20%E2%80%9CCastle%20Peak%E2%80%9D%20WS%20SP3&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
### POC
#### Reference
- http://seclists.org/fulldisclosure/2023/Jul/43
- http://www.openwall.com/lists/oss-security/2023/07/24/3
#### Github
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/Ixeoz/AMD-Zenbleed-Rendimiento
- https://github.com/amstelchen/smc_gui
- https://github.com/codexlynx/hardware-attacks-state-of-the-art
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/sbaresearch/stop-zenbleed-win
- https://github.com/speed47/spectre-meltdown-checker
- https://github.com/w1redch4d/windowz2-bleed