7.5
CVSSv3

CVE-2020-12965

Published: 04/02/2022 Updated: 06/12/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits potentially resulting in data leakage.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

amd ryzen_pro_5650g_firmware -

amd ryzen_pro_5650ge_firmware -

amd ryzen_pro_5750g_firmware -

amd ryzen_pro_5750ge_firmware -

amd ryzen_pro_5350g_firmware -

amd ryzen_pro_5350ge_firmware -

amd ryzen_pro_4750g_firmware -

amd ryzen_pro_4750ge_firmware -

amd ryzen_pro_4650g_firmware -

amd ryzen_pro_4650ge_firmware -

amd ryzen_pro_4350g_firmware -

amd ryzen_pro_4350ge_firmware -

amd ryzen_pro_3900_firmware -

amd ryzen_pro_3700_firmware -

amd ryzen_pro_3600_firmware -

amd ryzen_pro_3400g_firmware -

amd ryzen_pro_3400ge_firmware -

amd ryzen_pro_3350g_firmware -

amd ryzen_pro_3200g_firmware -

amd ryzen_pro_3200ge_firmware -

amd ryzen_pro_2400g_firmware -

amd ryzen_pro_2400ge_firmware -

amd ryzen_pro_2200g_firmware -

amd ryzen_pro_2200ge_firmware -

amd ryzen_threadripper_pro_3995wx_firmware -

amd ryzen_threadripper_pro_3975wx_firmware -

amd ryzen_threadripper_pro_3955wx_firmware -

amd ryzen_threadripper_pro_3945wx_firmware -

amd athlon_gold_pro_3150g_firmware -

amd athlon_gold_pro_3150ge_firmware -

amd athlon_silver_pro_3125ge_firmware -

amd athlon_pro_300ge_firmware -

amd athlon_pro_200ge_firmware -

amd ryzen_threadripper_3990x_firmware -

amd ryzen_threadripper_3970x_firmware -

amd ryzen_threadripper_3960x_firmware -

amd ryzen_threadripper_2990wx_firmware -

amd ryzen_threadripper_2970wx_firmware -

amd ryzen_threadripper_2950x_firmware -

amd ryzen_threadripper_2920x_firmware -

amd ryzen_threadripper_1950x_firmware -

amd ryzen_threadripper_1920x_firmware -

amd ryzen_threadripper_1900x_firmware -

amd ryzen_5950x_firmware -

amd ryzen_5800x3d_firmware -

amd ryzen_5900x_firmware -

amd ryzen_5800x_firmware -

amd ryzen_5600x_firmware -

amd ryzen_5700g_firmware -

amd ryzen_5600g_firmware -

amd ryzen_5700ge_firmware -

amd ryzen_5600ge_firmware -

amd ryzen_5300g_firmware -

amd ryzen_5300ge_firmware -

amd ryzen_4700g_firmware -

amd ryzen_4600g_firmware -

amd ryzen_4300g_firmware -

amd ryzen_4700ge_firmware -

amd ryzen_4600ge_firmware -

amd ryzen_4300ge_firmware -

amd athlon_3150ge_firmware -

amd athlon_3150g_firmware -

amd athlon_3050ge_firmware -

Vendor Advisories

Description<!---->A flaw was found in AMD CPUs When combined with specific software sequences, AMD CPUs may transiently execute non-canonical loads and store using only the lower 48 address bits, potentially resulting in data leakageA flaw was found in AMD CPUs When combined with specific software sequences, AMD CPUs may transiently execute non- ...

Recent Articles

Boffins find if you torture AMD Zen+, Zen 2 CPUs enough, they are vulnerable to Meltdown-like attack
The Register • Thomas Claburn in San Francisco • 30 Aug 2021

Get our weekly newsletter Chip biz's fix involves performance-inhibiting LFENCE, if warranted

Computer scientists at TU Dresden in Germany have found that AMD's Zen processor family is vulnerable to a data-bothering Meltdown-like attack after all. Exploiting this weakness is an academic exercise, it seems; there are more practical and easier ways for malware and malicious users to interfere with systems. If anything, it reminds us that modern CPU architectures have all kinds of side-channels, with some probably still left to find. In a paper [PDF] titled "Transient Execution of Non-Canon...