CVE-2023-31355

high-risk
Published 2024-08-05

Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.

Do I need to act?

-
0.80% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.0/10 Medium
LOCAL / LOW complexity

Affected Vendors

Amd
52
/ 100
high-risk
Severity 20/34 · Moderate
Exploitability 3/34 · Minimal
Exposure 29/34 · Critical