Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-36347

Опубликовано: 05 мар. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious microcode, potentially resulting in loss of integrity of x86 instruction execution, loss of confidentiality and integrity of data in x86 CPU privileged context and compromise of SMM execution environment.

A flaw was found in AMD processors. This flaw allows an attacker with system administration privileges to exploit an issue in the signature verification in the AMD CPU ROM microcode patch loader, allowing the load of malicious microcode. This issue could impact the integrity of x86 instruction execution, confidentiality, and data integrity in x86 CPU-privileged context and compromise the SMM execution environment.

Отчет

Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as a RHSA. For more information, please contact the binary content vendor. AMD believes this issue is caused by a weakness in the signature verification algorithm and the vulnerability could allow an administrator privileged attacker, the ability to load arbitrary CPU microcode patches. Malicious CPU microcode results in loss of integrity of x86 instruction execution, loss of confidentiality and integrity of data in x86 CPU privileged context and compromise of SMM execution environment.

Меры по смягчению последствий

Mitigation requires updating the BIOS for updating the CPU firmware. The bug affects hardware in processors of the AMD EPYC™ family: Naples, Rome, Milan, Milan-X, Genoa, Genoa-X, Bergamo/Siena and Raphael.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-99
https://bugzilla.redhat.com/show_bug.cgi?id=2336412kernel: hw:amd: Improper signature verification in AMD CPU ROM microcode patch loader

EPSS

Процентиль: 1%
0.00008
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 6.4
ubuntu
7 месяцев назад

Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious microcode, potentially resulting in loss of integrity of x86 instruction execution, loss of confidentiality and integrity of data in x86 CPU privileged context and compromise of SMM execution environment.

CVSS3: 6.4
nvd
7 месяцев назад

Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious microcode, potentially resulting in loss of integrity of x86 instruction execution, loss of confidentiality and integrity of data in x86 CPU privileged context and compromise of SMM execution environment.

CVSS3: 6.4
debian
7 месяцев назад

Improper signature verification in AMD CPU ROM microcode patch loader ...

CVSS3: 6.4
github
7 месяцев назад

Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious microcode, potentially resulting in loss of integrity of x86 instruction execution, loss of confidentiality and integrity of data in x86 CPU privileged context and compromise of SMM execution environment.

CVSS3: 6.4
fstec
больше 1 года назад

Уязвимость загрузчика обновлений микропрограммного обеспечения процессоров AMD связана с неправильной проверкой криптографической подписи. Эксплуатация уязвимости может позволить нарушителю выполнить произвольный код и отключить защиту System Management Mode (SMM)

EPSS

Процентиль: 1%
0.00008
Низкий

7.5 High

CVSS3