Metrics
Affected Vendors & Products
Wed, 02 Apr 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 06 Mar 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 06 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 06 Mar 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 12 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 04 Feb 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | kernel: hw:amd: Vulnerability in guest VM protected by SEV when loading malicious firmware | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 04 Feb 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 03 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP. | |
Weaknesses | CWE-347 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2025-04-02T22:03:14.707Z
Reserved: 2024-12-17T21:34:57.677Z
Link: CVE-2024-56161

Updated: 2025-04-02T22:03:14.707Z

Status : Awaiting Analysis
Published: 2025-02-03T18:15:37.280
Modified: 2025-04-02T22:15:17.963
Link: CVE-2024-56161
