{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-27672","assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","state":"PUBLISHED","assignerShortName":"AMD","dateReserved":"2022-03-23T14:57:22.754Z","datePublished":"2023-02-14T19:34:54.028Z","dateUpdated":"2026-04-13T19:53:49.458Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD","dateUpdated":"2026-04-13T19:53:49.458Z"},"datePublic":"2023-02-14T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","description":"n/a","type":"text"}]}],"affected":[{"vendor":"AMD","product":"1st Gen AMD EPYC™ Processors","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"2nd Gen AMD EPYC™ Processors","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"Athlon™ X4 Processor","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"Ryzen™ Threadripper™ PRO Processor","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"2nd Gen AMD Ryzen™ Threadripper™ Processors","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"3rd Gen AMD Ryzen™ Threadripper™ Processors","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"7th Generation AMD A-Series APUs","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"Ryzen™ 2000 Series Processors","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"Ryzen™ 3000 Series Processors","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"Ryzen™ 4000 Series Processors","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"Ryzen™ 5000 Series Processors","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"},{"vendor":"AMD","product":"Athlon™ Mobile Processors","platforms":["x86"],"versions":[{"status":"affected","version":"Contact your OS vendor"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"When SMT is enabled, certain AMD processors may speculatively execute instructions using a target\nfrom the sibling thread after an SMT mode switch potentially resulting in information disclosure.","supportingMedia":[{"type":"text/html","base64":false,"value":"When SMT is enabled, certain AMD processors may speculatively execute instructions using a target\nfrom the sibling thread after an SMT mode switch potentially resulting in information disclosure."}]}],"references":[{"url":"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1045","tags":["vendor-advisory"]},{"url":"https://security.gentoo.org/glsa/202402-07"}],"source":{"advisory":"AMD-SB-1045","discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"title":"CVE Program Container","references":[{"url":"http://xenbits.xen.org/xsa/advisory-426.html"},{"tags":["vendor-advisory","x_transferred"],"url":"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1045"},{"url":"https://security.gentoo.org/glsa/202402-07","tags":["x_transferred"]}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T05:32:59.968Z"}}]}}