#VU79239 Division by zero in AMD products


Vulnerability identifier: #VU79239

Vulnerability risk: Low

CVSSv3.1: 3.5 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2023-20588

CWE-ID: CWE-369

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
AMD EPYC 7001 Processors
Hardware solutions / Firmware
AMD Athlon 3000 Series Processors with Radeon Graphics
Hardware solutions / Firmware
AMD Ryzen 3000 Series Processors with Radeon Graphics
Hardware solutions / Firmware
AMD Athlon PRO 3000 Series Processors with Radeon Vega Graphics
Hardware solutions / Firmware
AMD Ryzen PRO 3000 Series Processors with Radeon Vega Graphics
Hardware solutions / Firmware

Vendor: AMD

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a divide by zero error that can return speculative data. A local user can gain access to potentially sensitive information.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

AMD EPYC 7001 Processors: All versions

AMD Athlon 3000 Series Processors with Radeon Graphics: All versions

AMD Ryzen 3000 Series Processors with Radeon Graphics: All versions

AMD Athlon PRO 3000 Series Processors with Radeon Vega Graphics: All versions

AMD Ryzen PRO 3000 Series Processors with Radeon Vega Graphics: All versions


External links
http://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability