CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

amd

epyc_7203_firmware

18 known vulnerabilities · sorted by CVSS score

CVE-2024-21980
HIGH7.9

Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.

amd / epyc_7203_firmware+85
Local
Published Aug 5, 2024
CVE-2023-20578
HIGH7.5

A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution.

amd / epyc_8024pn_firmware+104
Local
Published Aug 13, 2024
CVE-2021-26344
HIGH7.2

An out of bounds memory write when processing the AMD PSP1 Configuration Block (APCB) could allow an attacker with access the ability to modify the BIOS image, and the ability to sign the resulting image, to potentially modify the APCB block resulting in arbitrary code execution.

amd / epyc_7203_firmware+68
Local
Published Aug 13, 2024
CVE-2021-46774
MEDIUM6.7

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

amd / epyc_7001_firmware+136
Local
Published Nov 14, 2023
CVE-2023-20591
MEDIUM6.5

Improper re-initialization of IOMMU during the DRTM event may permit an untrusted platform configuration to persist, allowing an attacker to read or modify hypervisor memory, potentially resulting in loss of confidentiality, integrity, and availability.

amd / epyc_8024pn_firmware+64
Network
Published Aug 13, 2024
CVE-2023-20592
MEDIUM6.5

Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.

amd / epyc_7001_firmware+68
Network
Published Nov 14, 2023
CVE-2023-20533
MEDIUM6.1

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

amd / epyc_7232p_firmware+85
Local
Published Nov 14, 2023
CVE-2023-31355
MEDIUM6.0

Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.

amd / epyc_7203_firmware+85
Local
Published Aug 5, 2024
CVE-2023-31346
MEDIUM6.0

Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests.

amd / epyc_7773x_firmware+61
Local
Published Feb 13, 2024
CVE-2024-21978
MEDIUM6.0

Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.

amd / epyc_7203_firmware+85
Local
Published Aug 5, 2024
CVE-2023-20584
MEDIUM5.3

IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a compromised Hypervisor to induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a loss of guest integrity.

amd / epyc_8024pn_firmware+64
Local
Published Aug 13, 2024
CVE-2023-20566
MEDIUM5.3

Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.

amd / epyc_7763_firmware+64
Local
Published Nov 14, 2023
CVE-2023-31347
MEDIUM4.9

Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC is enabled potentially resulting in a loss of guest integrity.  

amd / epyc_7773x_firmware+61
Network
Published Feb 13, 2024
CVE-2023-20521
LOW3.3

TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.

amd / epyc_7001_firmware+92
Physical
Published Nov 14, 2023
CVE-2023-20573
LOW3.2

A privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests potentially resulting in guests not receiving expected debug information.

amd / epyc_7763_firmware+64
Local
Published Jan 11, 2024
CVE-2022-23830
LOW1.9

SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.

amd / epyc_9654p_firmware+64
Local
Published Nov 14, 2023
CVE-2021-26345
LOW1.9

Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.

amd / epyc_7742_firmware+89
Local
Published Nov 14, 2023
CVE-2023-20526
LOW1.9

Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.

amd / epyc_7001_firmware+72
Physical
Published Nov 14, 2023