CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%
Bulletin ID: AMD-SB-4003 **Potential Impact:**Arbitrary Code Execution Severity: High
SMM memory corruption vulnerability in SMM driver on some AMD Processors.
CVE-2023-20555
Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.
CVE | Severity | CVE Description |
---|---|---|
CVE-2023-20555 | High | Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM. |
The AGESA⢠firmware versions listed below have been released to the Original Equipment Manufacturers (OEM) to mitigate these issues. Please refer to your OEM for the BIOS update specific to your product.
CVE|AMD Ryzen⢠3000 Series Desktop Processors
âMatisseâ AM4|AMD Ryzen⢠5000 Series Desktop Processors
âVermeerâ AM4|AMD Ryzen⢠5000 Series Desktop Processor with Radeon⢠Graphics
âCezanneâ AM4|AMD Ryzen⢠7000 Series Processors
âRaphaelâ|AMD Athlon⢠3000 Series Desktop Processors with Radeon⢠Graphics
âPicassoâ|AMD Ryzen⢠4000 Series Desktop Processors with Radeon⢠Graphics
âRenoirâ FP5
â|â|â|â|â|â|â
CVE-2023-20555
| ComboAM4 PI V1 1.0.0.A
(2023-03-17)ComboAM4V2 PI 1.2.0.A
(2023-03-21)| ComboAM4 V2 PI 1.2.0.A
(2023-03-21)| ComboAM4v2 PI
1.2.0.A
(2023-03-21)| ComboAM5
1.0.0.6
(2023-02-24)| ComboAM4PIv1
1.0.0.A
(2023-3-17)ComboAM4V2
1.2.0.A
(2023-03-21)| ComboAM4V2
1.2.0.A
(2023-03-21)
CVE | AMD Ryzen⢠Threadripper⢠2000 Series Processors âColfaxâ | AMD Ryzen⢠Threadripper⢠3000 Series Processors âCastle Peakâ HEDT |
---|---|---|
CVE-2023-20555 | Not affected | Not affected |
CVE| AMD Ryzen⢠Threadripper⢠PRO 3000WX Series Processors
âCastle Peakâ WS SP3| AMD Ryzen⢠Threadripper⢠PRO Processors
âChagallâ WS
â|â|â
CVE-2023-20555| Not affected| Not affected
CVE| AMD Athlon⢠3000 Series Mobile Processors with Radeon⢠Graphics
âDaliâ/âDaliâ FP5| AMD Athlon⢠3000 Series Mobile Processors with Radeon⢠Graphics
âPollockâ
â|â|â
CVE-2023-20555| PicassoPI-FP5
1.0.0.F
(2023-03-23)| PollockPI-FT5
1.0.0.5
(2023-03-23)
CVE| AMD Ryzen⢠3000 Series Mobile Processors with Radeon⢠Graphics
âPicassoâ| AMD Ryzen⢠4000 Series Mobile Processors with Radeon⢠Graphics
âRenoirâ FP6| AMD Ryzen⢠5000 Series Mobile Processors with Radeon⢠Graphics
âLucienneâ| AMD Ryzen⢠5000 Series Mobile Processors with Radeon⢠Graphics
âCezanneâ
â|â|â|â|â
CVE-2023-20555| PicassoPI-FP5
1.0.0.F
(2023-03-23)ComboAM4PIv1
1.0.0.A
(2023-03-17)ComboAM4V2
1.2.0.A
(2023-03-21)| RenoirPI-FP6
1.0.0.B
(2023-2-10)ComboAM4V2
1.2.0.A
(2023-03-21)| CezannePI-FP6
1.0.0.E
(2023-03-19)| CezannePI-FP6
1.0.0.E
(2023-03-19)
CVE| AMD Ryzen⢠6000 Series Mobile Processors
âRembrandtâ| AMD Ryzen⢠7030 Series Mobile Processors
âBarceloâ| AMD Ryzen⢠7020 Series Mobile Processors
âMendocinoâ
â|â|â|â
CVE-2023-20555| RembrandtPI-FP7
1.0.0.8
(2023-03-01)| CezannePI-FP6
1.0.0.E
(2023-03-19)| MendocinoPI-FT6
1.0.0.5
(2023-03-09)
CVE | AMD Ryzen⢠Embedded R1000 | AMD Ryzen⢠Embedded R2000 | AMD Ryzen⢠Embedded 5000 |
---|---|---|---|
CVE-2023-20555 | EmbeddedPI-FP5 | ||
1.2.0.A | |||
(2023-07-31) | EmbeddedPI-FP5 | ||
1.0.0.2 | |||
(2023-07-31) | EmbAM4PI | ||
1.0.0.3 | |||
(2023-07-31) |
CVE | AMD Ryzen⢠Embedded R1000 | AMD Ryzen⢠Embedded R2000 | AMD Ryzen⢠Embedded 5000 |
---|---|---|---|
CVE-2023-20555 | **All V1000 OPNs | ||
excluding | |||
YE1500C4T4MFH** | YE1500C4T4MFH | EmbeddedPI-FP6 | |
1.0.0.8 | |||
(2023-07-31) | EmbeddedPI-FP7r2 | ||
1.0.0.5 | |||
(2023-07-28) | |||
EmbeddedPI-FP5 | |||
1.2.0.B | |||
(2024-01-15) |