CVE-2023-20579
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/02/2024
Last modified:
14/03/2025
Description
Improper<br />
Access Control in the AMD SPI protection feature may allow a user with Ring0<br />
(kernel mode) privileged access to bypass protections potentially resulting in<br />
loss of integrity and availability.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Impact
Base Score 3.x
6.00
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:* | comboam4v2pi_1.2.0.c (excluding) | |
| cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:* | comboam4v2pi_1.2.0.c (excluding) | |
| cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:* | comboam4v2pi_1.2.0.c (excluding) | |
| cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5_5600gt_firmware:*:*:*:*:*:*:*:* | comboam4v2pi_1.2.0.c (excluding) | |
| cpe:2.3:h:amd:ryzen_5_5600gt:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:* | comboam4v2pi_1.2.0.c (excluding) | |
| cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5_5500gt_firmware:*:*:*:*:*:*:*:* | comboam4v2pi_1.2.0.c (excluding) | |
| cpe:2.3:h:amd:ryzen_5_5500gt:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:* | comboam4v2pi_1.2.0.c (excluding) | |
| cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:* | comboam4v2pi_1.2.0.c (excluding) |
To consult the complete list of CPE names with products and versions, see this page



