{"containers":{"cna":{"affected":[{"product":"1st Gen AMD EPYC™","vendor":"AMD","versions":[{"lessThan":"NaplesPI-SP3_1.0.0.G","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"2nd Gen AMD EPYC™","vendor":"AMD","versions":[{"lessThan":"RomePI-SP3_1.0.0.C","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"3rd Gen AMD EPYC™","vendor":"AMD","versions":[{"lessThan":"MilanPI-SP3_1.0.0.4","status":"affected","version":"unspecified","versionType":"custom"}]}],"datePublic":"2021-11-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-693","description":"CWE-693 Protection Mechanism Failure","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-11-16T18:11:02.000Z","orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"}],"source":{"advisory":"AMD-SB-1021","discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@amd.com","DATE_PUBLIC":"2021-11-09T20:00:00.000Z","ID":"CVE-2020-12954","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"1st Gen AMD EPYC™","version":{"version_data":[{"version_affected":"<","version_value":"NaplesPI-SP3_1.0.0.G"}]}},{"product_name":"2nd Gen AMD EPYC™","version":{"version_data":[{"version_affected":"<","version_value":"RomePI-SP3_1.0.0.C"}]}},{"product_name":"3rd Gen AMD EPYC™","version":{"version_data":[{"version_affected":"<","version_value":"MilanPI-SP3_1.0.0.4"}]}}]},"vendor_name":"AMD"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification."}]},"generator":{"engine":"Vulnogram 0.0.9"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-693 Protection Mechanism Failure"}]}]},"references":{"reference_data":[{"name":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021","refsource":"MISC","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"}]},"source":{"advisory":"AMD-SB-1021","discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T12:11:18.706Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"}]}]},"cveMetadata":{"assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","assignerShortName":"AMD","cveId":"CVE-2020-12954","datePublished":"2021-11-16T18:11:02.785Z","dateReserved":"2020-05-15T00:00:00.000Z","dateUpdated":"2024-09-16T18:48:26.077Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}