{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T02:30:01.274","vulnerabilities":[{"cve":{"id":"CVE-2023-20581","sourceIdentifier":"psirt@amd.com","published":"2025-02-11T22:15:26.223","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Improper access control in the IOMMU may allow a privileged attacker to bypass RMP checks, potentially leading to a loss of guest memory integrity."},{"lang":"es","value":"Un control de acceso inadecuado en IOMMU puede permitir que un atacante privilegiado evite las comprobaciones de RMP, lo que podría provocar una pérdida de integridad de la memoria del invitado."}],"metrics":{"cvssMetricV31":[{"source":"psirt@amd.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N","baseScore":2.5,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.8,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@amd.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1284"}]}],"references":[{"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3009.html","source":"psirt@amd.com"},{"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5004.html","source":"psirt@amd.com"}]}}]}