CVE-2024-56161

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

7.2high3.x
0246810

CVSS Score: 7.2/10

All CVSS Scores

CVSS 3.x
7.2

Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N

Description

Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

astradebianubuntu

CWEs

CWE-347

Related Vulnerabilities

Vulnerable Software (6)

Type: Configuration

Product: amd64-microcode

Operating System: astra 1.8.0

Trait:
{  "unaffected": true}

Source: astra

Type: Configuration

Product: amd64-microcode

Operating System: astra 1.7.0

Trait:
{  "unaffected": true}

Source: astra

Type: Configuration

Product: amd64-microcode

Operating System: ubuntu focal 20.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: amd64-microcode

Operating System: ubuntu jammy 22.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: amd64-microcode

Operating System: debian

Trait:
{  "fixed": "3.20250311.1"}

Source: debian

Type: Configuration

Product: amd64-microcode

Operating System: debian bookworm 12

Trait:
{  "fixed": "3.20250311.1~deb12u1"}

Source: debian