A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.
A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.
| Vendor | Product | Versions |
|---|---|---|
| AMD | AMD EPYC™ 7003 Series Processors | MilanPI 1.0.0.G + OS Updates |
| AMD | AMD EPYC™ 9004 Series Processors | GenoaPI 1.0.0.E + OS Updates |
| AMD | AMD EPYC™ 8004 Series Processors | GenoaPI 1.0.0.E + OS Updates |
| AMD | AMD EPYC™ 9V64H Processor | MI300PI 1.0.0.7 + OS Updates |
| AMD | AMD Ryzen™ 5000 Series Desktop Processors | ComboAM4v2PI 1.2.0.E + OS Updates |
| AMD | AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics | ComboAM4v2PI 1.2.0.E + OS Updates |
| AMD | AMD Ryzen™ 7000 Series Desktop Processors | ComboAM5PI 1.2.0.3 + OS Updates, ComboAM5PI 1.0.0.a+ OS Updates, ComboAM5PI 1.1.0.3c+ OS Updates |
| AMD | AMD Ryzen™ 8000 Series Processor with Radeon™ Graphics | ComboAM5PI 1.2.0.3 + OS Updates, ComboAM5PI 1.1.0.3c+ OS Updates |
| AMD | AMD Ryzen™ Threadripper™ PRO 7000 WX | Series Processors — StormPeakPI-SP6 1.1.0.0i + OS Updates, StormPeakPI-SP6 1.0.0.1k + OS Updates |
| AMD | AMD Ryzen™ 6000 Series Processor with Radeon™ Graphics | RembrandtPI-FP7 1.0.0.Bb + OS Updates |
| AMD | AMD Ryzen™ 7035 Series Processor with Radeon™ Graphics | RembrandtPI-FP7 1.0.0.Bb + OS Updates |
| AMD | AMD Ryzen™ 7000 Series Processors with Radeon™ Graphics | CezannePI-FP6 1.0.1.1b + OS Updates |
| AMD | AMD Ryzen™ 7040 Series Processors with Radeon™ Graphics | PhoenixPI-FP8-FP7 1.2.0.0 + OS Updates |
| AMD | AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics | PhoenixPI-FP8-FP7 1.2.0.0 + OS Updates |
| AMD | AMD Ryzen™ 7000 Series Mobile Processors | DragonRangeFL1 1.0.0.3g + OS Updates |
| AMD | AMD EPYC™ Embedded 7003 Series Processors | EmbMilanPI-SP3 1.0.0.A + OS updates |
| AMD | AMD EPYC™ Embedded 8004 Series Processors | EmbGenoaPI-SP5 1.0.0.9 + OS updates |
| AMD | AMD EPYC™ Embedded 9004 Series Processors | EmbGenoaPI-SP5 1.0.0.9 + OS updates |
| AMD | AMD Ryzen™ Embedded 5000 Series Processors | EmbAM4PI 1.0.0.7 + OS Update |
| AMD | AMD Ryzen™ Embedded 7000 Series Processors | EmbeddedAM5PI 1.0.0.3 + OS updates |
| AMD | AMD Ryzen™ Embedded V3000 Series Processors | Embedded-PI_FP7r2 100C + OS updates |
| AMD | AMD EPYC™ Embedded 97X4 | EmbGenoaPI-SP5 1.0.0.9 + OS updates |
| AMD | AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics | CezannePI-FP6 1.0.1.1b + OS Updates |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.