Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-20588


A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 5.5, requiring local system access to exploit with relatively low complexity without requiring user interaction requiring only low-level privileges . The vulnerability impacts confidentiality (data exposure), for affected systems. Impacting 78 products from debian, from amd, from amd and 75 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2023, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2023-08-08T18:15:11.653

Last Modified

2024-11-21T07:41:10.450

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.5 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-369

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System debian debian_linux 10.0 Yes
Operating System debian debian_linux 11.0 Yes
Operating System debian debian_linux 12.0 Yes
Operating System amd epyc_7351p_firmware - Yes
Hardware amd epyc_7351p - No
Operating System amd epyc_7401p_firmware - Yes
Hardware amd epyc_7401p - No
Operating System amd epyc_7551p_firmware - Yes
Hardware amd epyc_7551p - No
Operating System amd epyc_7251_firmware - Yes
Hardware amd epyc_7251 - No
Operating System amd epyc_7261_firmware - Yes
Hardware amd epyc_7261 - No
Operating System amd epyc_7281_firmware - Yes
Hardware amd epyc_7281 - No
Operating System amd epyc_7301_firmware - Yes
Hardware amd epyc_7301 - No
Operating System amd epyc_7351_firmware - Yes
Hardware amd epyc_7351 - No
Operating System amd epyc_7371_firmware - Yes
Hardware amd epyc_7371 - No
Operating System amd epyc_7401_firmware - Yes
Hardware amd epyc_7401 - No
Operating System amd epyc_7451_firmware - Yes
Hardware amd epyc_7451 - No
Operating System amd epyc_7501_firmware - Yes
Hardware amd epyc_7501 - No
Operating System amd epyc_7551_firmware - Yes
Hardware amd epyc_7551 - No
Operating System amd epyc_7571_firmware - Yes
Hardware amd epyc_7571 - No
Operating System amd epyc_7601_firmware - Yes
Hardware amd epyc_7601 - No
Operating System amd ryzen_5_pro_3400g_firmware - Yes
Hardware amd ryzen_5_pro_3400g - No
Operating System amd ryzen_5_3400g_firmware - Yes
Hardware amd ryzen_5_3400g - No
Operating System amd ryzen_5_pro_3400ge_firmware - Yes
Hardware amd ryzen_5_pro_3400ge - No
Operating System amd ryzen_5_pro_3350g_firmware - Yes
Hardware amd ryzen_5_pro_3350g - No
Operating System amd ryzen_5_pro_3350ge_firmware - Yes
Hardware amd ryzen_5_pro_3350ge - No
Operating System amd ryzen_3_pro_3200g_firmware - Yes
Hardware amd ryzen_3_pro_3200g - No
Operating System amd ryzen_3_3200g_firmware - Yes
Hardware amd ryzen_3_3200g - No
Operating System amd ryzen_3_3200ge_firmware - Yes
Hardware amd ryzen_3_3200ge - No
Operating System amd ryzen_3_pro_3200ge_firmware - Yes
Hardware amd ryzen_3_pro_3200ge - No
Operating System amd athlon_pro_300ge_firmware - Yes
Hardware amd athlon_pro_300ge - No
Operating System amd athlon_gold_3150ge_firmware - Yes
Hardware amd athlon_gold_3150ge - No
Operating System amd athlon_gold_pro_3150ge_firmware - Yes
Hardware amd athlon_gold_pro_3150ge - No
Operating System amd athlon_gold_3150g_firmware - Yes
Hardware amd athlon_gold_3150g - No
Operating System amd athlon_gold_pro_3150g_firmware - Yes
Hardware amd athlon_gold_pro_3150g - No
Operating System amd athlon_silver_3050ge_firmware - Yes
Hardware amd athlon_silver_3050ge - No
Operating System amd athlon_silver_pro_3125ge_firmware - Yes
Hardware amd athlon_silver_pro_3125ge - No
Operating System xen xen - Yes
Operating System fedoraproject fedora 37 Yes
Operating System fedoraproject fedora 38 Yes
Operating System fedoraproject fedora 39 Yes
Operating System microsoft windows_10_1507 < 10.0.10240.20345 Yes
Operating System microsoft windows_10_1607 < 10.0.14393.6529 Yes
Operating System microsoft windows_10_1809 < 10.0.17763.5206 Yes
Operating System microsoft windows_10_21h2 < 10.0.19044.3803 Yes
Operating System microsoft windows_10_22h2 < 10.0.19045.3803 Yes
Operating System microsoft windows_11_21h2 < 10.0.22000.2652 Yes
Operating System microsoft windows_11_22h2 < 10.0.22621.2861 Yes
Operating System microsoft windows_11_23h2 < 10.0.22631.2861 Yes
Operating System microsoft windows_server_2008 - Yes
Operating System microsoft windows_server_2008 r2 Yes
Operating System microsoft windows_server_2012 - Yes
Operating System microsoft windows_server_2012 r2 Yes
Operating System microsoft windows_server_2016 < 10.0.14393.6529 Yes
Operating System microsoft windows_server_2019 < 10.0.17763.5206 Yes
Operating System microsoft windows_server_2022_23h2 < 10.0.25398.584 Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For debian's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.