{"containers":{"cna":{"affected":[{"product":"1st/2nd/3rd Gen AMD EPYC™ Processors","vendor":"AMD","versions":[{"lessThan":"undefined","status":"affected","version":"unspecified","versionType":"custom"}]}],"datePublic":"2021-08-10T00:00:00.000Z","descriptions":[{"lang":"en","value":"AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor."}],"problemTypes":[{"descriptions":[{"description":"TBD","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-08-08T17:06:45.000Z","orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013"},{"name":"[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2022/08/08/6"}],"source":{"advisory":"AMD-SB-1013","discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@amd.com","DATE_PUBLIC":"2021-08-10T19:30:00.000Z","ID":"CVE-2020-12966","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"1st/2nd/3rd Gen AMD EPYC™ Processors","version":{"version_data":[{"version_affected":"<","version_value":""}]}}]},"vendor_name":"AMD"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor."}]},"generator":{"engine":"Vulnogram 0.0.9"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"TBD"}]}]},"references":{"reference_data":[{"name":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013","refsource":"MISC","url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013"},{"name":"[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2022/08/08/6"}]},"source":{"advisory":"AMD-SB-1013","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T12:11:19.042Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013"},{"name":"[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/08/08/6"}]}]},"cveMetadata":{"assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","assignerShortName":"AMD","cveId":"CVE-2020-12966","datePublished":"2022-02-04T22:29:12.748Z","dateReserved":"2020-05-15T00:00:00.000Z","dateUpdated":"2024-09-17T01:06:34.720Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}