Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-21977

CVSS 3.2 · Low EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-21977

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Incomplete cleanup after loading a CPU microcode patch may allow a privileged attacker to degrade the entropy of the RDRAND instruction, potentially resulting in loss of integrity for SEV-SNP guests.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
清理环节不完整
Source: NVD (National Vulnerability Database)
Vulnerability Title
AMD多款产品 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
AMD Embedded Processors等都是美国超威半导体(AMD)公司的产品。AMD Embedded Processors是一系列嵌入式高性能 GPU。AMD Client Processor是面向客户端设备(如个人电脑、笔记本电脑等)的处理器。AMD Server Processor是面向服务器市场的处理器产品,主要用于数据中心、云计算、高性能计算等领域。 AMD多款产品存在安全漏洞,该漏洞源于加载CPU微码补丁后清理不完整,可能导致特权攻击者降低RDRAND指令的熵,影响SEV-SNP客户
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
AMDAMD EPYC™ 7003 Series Processors MilanPI 1.0.0.D -
AMDAMD EPYC™ 9004 Series Processors GenoaPI 1.0.0.C -
AMDAMD EPYC™ 8004 Series Processors GenoaPI 1.0.0.C -
AMDAMD Ryzen™ Threadripper™ PRO 5000 WX-Series Processors ChagallWSPI-sWRX8 1.0.0.8 -
AMDAMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics CezannePI-FP6_1.0.1.1 -
AMDAMD Ryzen™ 7035 Series Processors with Radeon™ Graphics RembrandtPI-FP7/FP7r2_1.0.0.B -
AMDAMD Ryzen™ 5000 Series Desktop Processors ComboAM4v2 1.2.0.Cb -
AMDAMD Ryzen™ 7000 Series Desktop Processors ComboAM5 1.2.0.1 -
AMDAMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics PhoenixPI-FP8-FP7_1.1.0.3 -
AMDAMD Ryzen™ 6000 Series Processors with Radeon™ Graphics RembrandtPI-FP7/FP7r2_1.0.0.B -
AMDAMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics DragonRangeFL1 1.0.0.3e -
AMDAMD Ryzen™ Threadripper™ PRO 3000 WX-Series Processors ChagallWSPI-sWRX8 1.0.0.8 -
AMDAMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics CezannePI-FP6_1.0.1.1 -
AMDAMD Ryzen™ 8000 Series Desktop Processors ComboAM5 1.2.0.1 -
AMDAMD EPYC™ Embedded 7003 Series Processors EmbMilanPI-SP3 1.0.0.9 -
AMDAMD EPYC™ Embedded 9004 Series Processors EmbGenoaPI-SP5 1.0.0.9 -
AMDAMD Ryzen™ Embedded 8000 Series Processors EmbeddedPhoenixPI-FP7r2_1.2.0.0 -
AMDAMD Ryzen™ Embedded 7000 Series Processors EmbeddedAM5PI 1.0.0.3 -
AMDAMD Ryzen™ Embedded 5000 Series Processors EmbAM4PI 1.0.0.7 -
AMDAMD Ryzen™ Embedded V3000 Series Processors Embedded-PI_FP7r2 100A -

II. Public POCs for CVE-2024-21977

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-21977

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-21977

No comments yet


Leave a comment