CVE-2023-31315

EUVD-2023-35626
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
LOCAL
HIGH
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
amd1st_gen_amd_epyc_processors
𝑥
< naples.pi.1.0.0.m
ADP
amd3rd_gen_amd_epyc_processors
𝑥
< milan.pi.1.0.0.d
ADP
amd2nd_gen_amd_epyc_processors
𝑥
< rome.pi.1.0.0.j
ADP
amd4th_gen_amd_epyc_processors
𝑥
< genoa_pi_1.0.0.c
ADP
amdepyc_embedded_9003
𝑥
< emgenoa.pi.1.0.0.7
ADP
amdryzen_7040_series_mobile_processors_with_radeon_graphics
various ≤
𝑥
< phoenixpi-fp8-fp7.1.1.0.3
ADP
amdryzen_5000_series_desktop_processors
𝑥
< comboam4v2pi.1.2.0.cb
ADP
amdryzen_5000_series_desktop_processors_with_radeon_graphics
𝑥
< comboam4v2pi.1.2.0.cb
ADP
amdryzen_7000_desktop_processors
𝑥
< comboam5pi.1.2.0.1
ADP
amdryzen_4000_series_desktop_processors_with_radeon_graphics
𝑥
< comboam4v2pi.1.2.0.cb
ADP
amdryzen_threadripper_3000_series_processors
𝑥
< castlepeakpl-sp3r3.1.0.0.b
ADP
amdryzen_threadripper_pro_processors
various ≤
𝑥
< chagallwspi-swrx8.1.0.0.8
ADP
amdryzen_threadripper_pro_processors
various ≤
𝑥
< castlepeakwspi-swrx8.1.0.0.8
ADP
amdryzen_threadripper_pro_3000wx_series_processors
various ≤
𝑥
< chagallwspi-swrx8.1.0.0.8
ADP
amdathlon_3000_series_mobile_processors_with_radeon_graphics
various ≤
𝑥
< picasso-fp5.1.0.1.2
ADP
amdathlon_3000_series_mobile_processors_with_radeon_graphics
various ≤
𝑥
< pollockpi-ft5.1.0.0.8
ADP
amdryzen_3000_series_desktop_processors_with_radeon_graphics
various ≤
𝑥
< picasso-fp5.1.0.1.2
ADP
amdryzen_4000_series_mobile_processors_with_radeon_graphics
various ≤
𝑥
< renoirpi-fp6.1.0.0.e
ADP
amdryzen_5000_series_mobile_processors_with_radeon_graphics
various ≤
𝑥
< cezannepi-fp6.1.0.1.1
ADP
amdryzen_7030_series-mobile_processors_with_radeon_graphics
various ≤
𝑥
< cezannepi-fp6
ADP
amdryzen_7045_series_mobile_processors
various ≤
𝑥
< dragonrangefl1.1.0.0.3e
ADP
amdryzen_6000_processors_with_radeongraphics
various ≤
𝑥
< remembrandtpi-fp7.1.0.0.b
ADP
amdryzen_7020_processors_with_radeongraphics
various ≤
𝑥
< mendocinopi-ft6.1.0.0.7
ADP
amdryzen_7035_processors_with_radeongraphics
various ≤
𝑥
< remembrandtpi-fp7.1.0.0.b
ADP
amdryzen_8000_series_processors_with_radeongraphics
various ≤
𝑥
< comboam5pi.1.2.0.1
ADP
Debian logo
Debian Releases
Debian Product
Codename
amd64-microcode
bookworm/non-free-firmware
3.20240820.1~deb12u1
fixed
bookworm/non-free-firmware (security)
vulnerable
bullseye/non-free
3.20240820.1~deb11u1
fixed
bullseye/non-free (security)
vulnerable
sid/non-free-firmware
3.20240820.1
fixed
trixie/non-free-firmware
3.20240820.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
amd64-microcode
bionic
Fixed 3.20191021.1+really3.20181128.1~ubuntu0.18.04.1+esm3
released
focal
Fixed 3.20191218.1ubuntu1.3
released
jammy
Fixed 3.20191218.1ubuntu2.3
released
noble
Fixed 3.20231019.1ubuntu2.1
released
oracular
Fixed 3.20240116.2+nmu1ubuntu1.1
released
trusty
ignored
xenial
Fixed 3.20191021.1+really3.20180524.1~ubuntu0.16.04.2+esm3
released