Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-20570


Insufficient verification of data authenticity in the configuration state machine may allow a local attacker to potentially load arbitrary bitstreams.


Security Impact Summary

This vulnerability carries a LOW severity rating with a CVSS v3.1 score of 3.3, requiring local system access to exploit with relatively low complexity without requiring user interaction requiring only low-level privileges . The vulnerability impacts limited integrity, for affected systems. Impacting 94 products from amd, from amd, from amd and 91 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2024, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2024-02-13T18:15:47.233

Last Modified

2025-03-22T15:15:35.730

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 3.3 (LOW)

Weaknesses
  • Type: Primary
    CWE-345
  • Type: Secondary
    CWE-345

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System amd alveo_u50_firmware - Yes
Hardware amd alveo_u50 - No
Operating System amd alveo_u200_firmware - Yes
Hardware amd alveo_u200 - No
Operating System amd alveo_u250_firmware - Yes
Hardware amd alveo_u250 - No
Operating System amd alveo_u280_firmware - Yes
Hardware amd alveo_u280 - No
Operating System amd kintex_ultrascale\+_ku3p_firmware - Yes
Hardware amd kintex_ultrascale\+_ku3p - No
Operating System amd kintex_ultrascale\+_ku5p_firmware - Yes
Hardware amd kintex_ultrascale\+_ku5p - No
Operating System amd kintex_ultrascale\+_ku9p_firmware - Yes
Hardware amd kintex_ultrascale\+_ku9p - No
Operating System amd kintex_ultrascale\+_ku11p_firmware - Yes
Hardware amd kintex_ultrascale\+_ku11p - No
Operating System amd kintex_ultrascale\+_ku13p_firmware - Yes
Hardware amd kintex_ultrascale\+_ku13p - No
Operating System amd kintex_ultrascale\+_ku15p_firmware - Yes
Hardware amd kintex_ultrascale\+_ku15p - No
Operating System amd kintex_ultrascale\+_ku19p_firmware - Yes
Hardware amd kintex_ultrascale\+_ku19p - No
Operating System amd kintex_ultrascale_ku025_firmware - Yes
Hardware amd kintex_ultrascale_ku025 - No
Operating System amd kintex_ultrascale_ku035_firmware - Yes
Hardware amd kintex_ultrascale_ku035 - No
Operating System amd kintex_ultrascale_ku040_firmware - Yes
Hardware amd kintex_ultrascale_ku040 - No
Operating System amd kintex_ultrascale_ku060_firmware - Yes
Hardware amd kintex_ultrascale_ku060 - No
Operating System amd kintex_ultrascale_ku085_firmware - Yes
Hardware amd kintex_ultrascale_ku085 - No
Operating System amd kintex_ultrascale_ku095_firmware - Yes
Hardware amd kintex_ultrascale_ku095 - No
Operating System amd kintex_ultrascale_ku115_firmware - Yes
Hardware amd kintex_ultrascale_ku115 - No
Operating System amd virtex_ultrascale_xcvu065_firmware - Yes
Hardware amd virtex_ultrascale_xcvu065 - No
Operating System amd virtex_ultrascale_xcvu080_firmware - Yes
Hardware amd virtex_ultrascale_xcvu080 - No
Operating System amd virtex_ultrascale_xcvu095_firmware - Yes
Hardware amd virtex_ultrascale_xcvu095 - No
Operating System amd virtex_ultrascale_xcvu125_firmware - Yes
Hardware amd virtex_ultrascale_xcvu125 - No
Operating System amd virtex_ultrascale_xcvu160_firmware - Yes
Hardware amd virtex_ultrascale_xcvu160 - No
Operating System amd virtex_ultrascale_xcvu190_firmware - Yes
Hardware amd virtex_ultrascale_xcvu190 - No
Operating System amd virtex_ultrascale_xcvu440_firmware - Yes
Hardware amd virtex_ultrascale_xcvu440 - No
Operating System amd virtex_ultrascale\+_vu3p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu3p - No
Operating System amd virtex_ultrascale\+_vu5p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu5p - No
Operating System amd virtex_ultrascale\+_vu7p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu7p - No
Operating System amd virtex_ultrascale\+_vu9p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu9p - No
Operating System amd virtex_ultrascale\+_vu11p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu11p - No
Operating System amd virtex_ultrascale\+_vu13p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu13p - No
Operating System amd virtex_ultrascale\+_vu19p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu19p - No
Operating System amd virtex_ultrascale\+_vu23p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu23p - No
Operating System amd virtex_ultrascale\+_vu27p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu27p - No
Operating System amd virtex_ultrascale\+_vu29p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu29p - No
Operating System amd virtex_ultrascale\+_vu31p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu31p - No
Operating System amd virtex_ultrascale\+_vu33p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu33p - No
Operating System amd virtex_ultrascale\+_vu35p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu35p - No
Operating System amd virtex_ultrascale\+_vu37p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu37p - No
Operating System amd virtex_ultrascale\+_vu45p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu45p - No
Operating System amd virtex_ultrascale\+_vu47p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu47p - No
Operating System amd virtex_ultrascale\+_vu57p_firmware - Yes
Hardware amd virtex_ultrascale\+_vu57p - No
Operating System amd artix_ultrascale\+_au7p_firmware - Yes
Hardware amd artix_ultrascale\+_au7p - No
Operating System amd artix_ultrascale\+_au10p_firmware - Yes
Hardware amd artix_ultrascale\+_au10p - No
Operating System amd artix_ultrascale\+_au15p_firmware - Yes
Hardware amd artix_ultrascale\+_au15p - No
Operating System amd artix_ultrascale\+_au20p_firmware - Yes
Hardware amd artix_ultrascale\+_au20p - No
Operating System amd artix_ultrascale\+_au25p_firmware - Yes
Hardware amd artix_ultrascale\+_au25p - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For amd's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.