cve/2024/CVE-2024-56161.md

23 lines
1.2 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-56161](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56161)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%207001%20Series&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%207002%20Series&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%207003%20Series&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%209004%20Series&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.
### POC
#### Reference
2025-09-29 21:09:30 +02:00
- http://www.openwall.com/lists/oss-security/2025/02/04/1
2025-09-29 16:08:36 +00:00
#### Github
- https://github.com/divestedcg/real-ucode
- https://github.com/e-tho/ucodenix
2025-09-29 21:09:30 +02:00
- https://github.com/w4zu/Debian_security
2025-09-29 16:08:36 +00:00