Impact
An attacker may abuse a flaw in how shared resources within the CPU operation cache are isolated on Zen 2‑based AMD processors. The improper isolation enables corruption of instructions that are executed at a higher privilege level, thereby allowing the attacker to gain elevated privileges. The weakness is a Classic CWE‑1189 "Improper Isolation of Shared Resources" and can impact confidentiality, integrity, and availability of the affected systems if the privilege escalation succeeds.
Affected Systems
AMD products that use Zen 2 microarchitecture are listed as affected, including the EPYC 7002 and Embedded 7002 Series, Ryzen 3000 and 4000 Series desktop and mobile processors, Ryzen 5000 and 7020 Series, Ryzen 7030 Mobile, Ryzen V2000 Embedded, and Threadripper PRO 3000 WX‑Series processors. The vulnerability applies across all processors that contain the relevant shared cache resources identified in the AMD Security Bulletin AMD‑SB‑7052.
Risk and Exploitability
The CVSS score of 7.3 indicates a high severity, though the EPSS score is not available, so the likelihood of exploitation cannot be quantified from the available data. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is local and requires an attacker to be able to influence or observe cache contents; it is likely to be exploitable from a user or guest context privileged to inject code that can exploit the cache mis‑isolation.
OpenCVE Enrichment