PS-Chi

From PS5 Developer wiki
Revision as of 20:07, 11 August 2024 by Thr33Day (talk | contribs) (I want to document my progress publicly as I attempt to use the zenbleed exploit on my 2.50 console)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

PS-Chi is the pseudonym of the potential exploit with CVE-2023-20593 that allows reading the registry file contents of the processor directly. It affects AMD Zen 2 Microarchitecture.

Resources[edit | edit source]

  1. Trent Novelly's article on writing a ZenBleed PoC for Chrome
    1. Trent Novelly's GitHub Code
  2. Google Research GitHub - ZenBleed PoC using C