In AMD EPYC this vulnerability, no
The Intel brand is a mechanism for improving performance, which is called Direct Data I/O or DDIO and enables network adapters to directly access the CPU cache memory of the third level, completely bypassing the RAM to speed up your network card to reduce latency.
Researchers in the field of cyber security from the Vrije Universiteit of Amsterdam and ETH Zurich have published research in which is described that they discovered a critical vulnerability NetCAT related to DDIO. It allows hacked servers to steal data from all other computers in the local network. In particular, this includes the ability to keystrokes and other sensitive data passing through the memory of vulnerable systems. This effect is compounded in data centers, which included not only DDIO, but also RDMA (remote direct memory access), in which one server can compromise the entire network. RDMA is a key component of improving productivity in high performance computing and supercomputing environments.
Vulnerability NetCAT creates a big problem for providers web hosting. If a hacker rents a server in the data center with support for RDMA and DDIO, it could compromise the servers of other customers and steal their information.
Intel has asked the users of the systems on the Xeon and DDIO disable RDMA on machines with access to untrusted networks while she’s working on a fix that should eliminate the vulnerability.
AMD EPYC don’t support DDIO, so they are not described vulnerability.