Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-56161

Опубликовано: 03 фев. 2025
Источник: redhat
CVSS3: 7.2
EPSS Низкий

Описание

Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.

A vulnerability was found in hw AMD processors. This flaw allows an attacker with system administrator privileges to exploit a flaw in the microcode signature verification, enabling the loading of malicious microcode. This issue could compromise the confidentiality and integrity of guest VMs protected by AMD’s Secure Encrypted Virtualization (SEV), undermining its security.

Отчет

Red Hat has very limited to no visibility and control over binary blobs provided by third-party vendors. Red Hat relies heavily on the vendors to provide timely updates and information about included changes for this content and in most cases merely acts as a release vehicle between the third-party vendor and Red Hat customers with no possibility of influencing or even documenting the changes. Unless explicitly stated, the level of insight, oversight, and control Red Hat has does not meet the criteria required (in terms of Red Hat ownership of development processes, QA, and documentation) for releasing this content as a RHSA. For more information please contact the binary content vendor.

Меры по смягчению последствий

Mitigation requires updating the BIOS (for updating the firmware of the CPU). The bug affects hardware in processors of the AMD EPYC™ family: Naples, Rome, Milan, Genoa, Bergamo/Siena.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10linux-firmwareNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7linux-firmwareNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8linux-firmwareNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9linux-firmwareNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2336408kernel: hw:amd: Vulnerability in guest VM protected by SEV when loading malicious firmware

EPSS

Процентиль: 3%
0.00015
Низкий

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
ubuntu
11 месяцев назад

Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.

CVSS3: 7.2
nvd
11 месяцев назад

Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.

CVSS3: 7.2
debian
11 месяцев назад

Improper signature verification in AMD CPU ROM microcode patch loader ...

CVSS3: 7.2
fstec
около 1 года назад

Уязвимость загрузчика микрокода AMD CPU ROM микропрограммного обеспечения процессоров AMD, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

EPSS

Процентиль: 3%
0.00015
Низкий

7.2 High

CVSS3