CVE-2023-31355

6.0 MEDIUM

📋 TL;DR

This vulnerability in AMD Secure Nested Paging (SNP) firmware allows a malicious hypervisor to overwrite a guest's UMC (Unified Memory Controller) seed, potentially enabling memory reading from decommissioned guests. It affects systems using AMD EPYC processors with SNP enabled. The risk primarily impacts cloud providers and virtualized environments.

💻 Affected Systems

Products:
  • AMD EPYC processors with Secure Nested Paging (SNP) enabled
Versions: All versions prior to firmware updates addressing CVE-2023-31355
Operating Systems: All operating systems running as guests on affected AMD EPYC systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with SNP enabled. Cloud providers and virtualized environments are primarily affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A compromised hypervisor could read sensitive data from memory of previously decommissioned virtual machines, potentially exposing encryption keys, passwords, or other confidential information.

🟠

Likely Case

In multi-tenant cloud environments, a malicious tenant with hypervisor access could potentially access residual data from other tenants' decommissioned VMs.

🟢

If Mitigated

With proper hypervisor security controls and isolation, the attack surface is significantly reduced, limiting the impact to theoretical scenarios.

🌐 Internet-Facing: LOW - This vulnerability requires hypervisor-level access, which is typically not internet-facing.
🏢 Internal Only: MEDIUM - The risk exists in virtualized environments where hypervisor compromise could occur through internal attacks or compromised management interfaces.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires hypervisor-level access and specific knowledge of AMD SNP architecture. No public exploits have been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AMD firmware updates with AGESA version 1.0.0.7 or later

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html

Restart Required: Yes

Instructions:

1. Check current firmware version using vendor tools. 2. Download updated firmware from AMD or system manufacturer. 3. Apply firmware update following manufacturer instructions. 4. Reboot system to activate new firmware.

🔧 Temporary Workarounds

Disable SNP feature

all

Disabling Secure Nested Paging removes the vulnerability but also eliminates SNP security benefits

Check BIOS/UEFI settings for SNP/SEV-SNP options and disable

🧯 If You Can't Patch

  • Implement strict hypervisor security controls and monitoring
  • Isolate hypervisor management interfaces and limit access to trusted administrators only

🔍 How to Verify

Check if Vulnerable:

Check firmware version using 'dmidecode' or manufacturer-specific tools and compare against patched versions listed in AMD advisory

Check Version:

sudo dmidecode -t bios | grep -i version

Verify Fix Applied:

Verify firmware version has been updated to AGESA 1.0.0.7 or later and confirm SNP is functioning properly

📡 Detection & Monitoring

Log Indicators:

  • Hypervisor access logs showing unusual activity
  • Firmware update logs

Network Indicators:

  • Unusual hypervisor management traffic patterns

SIEM Query:

Hypervisor access logs where source IP is not from trusted management network

🔗 References

📤 Share & Export