All the vulnerabilites related to amd - radeon_rx_6600_xt
cve-2021-26360
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 22:56
Severity ?
EPSS score ?
Summary
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon RX 6000 Series & PRO W6000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.015Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series", "vendor": "AMD", "versions": [ { "lessThan": "22.5.2", "status": "affected", "version": "AMD Radeon Software", "versionType": "custom" }, { "lessThan": "22.Q2", "status": "affected", "version": "AMD Radeon Pro Software Enterprise", "versionType": "custom" }, { "lessThan": "22.10.20", "status": "affected", "version": "Enterprise Driver", "versionType": "custom" } ] } ], "datePublic": "2022-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor\u2019s encrypted memory contents which may lead to arbitrary code execution in ASP." } ], "problemTypes": [ { "descriptions": [ { "description": "TBD", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" } ], "source": { "advisory": "AMD-SB-1029", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26360", "datePublished": "2022-11-09T20:44:26.034287Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T22:56:17.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20568
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AMD Software: Adrenalin Edition 23.7.1 ", "platforms": [ "x86" ], "product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AMD Software: PRO Edition 23.Q3 ", "platforms": [ "x86" ], "product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "Radeon\u2122 RX Vega Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "Radeon\u2122 PRO WX Vega Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-11-14T18:51:35.466Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" } ], "source": { "advisory": "AMD-SB-6003", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20568", "datePublished": "2023-11-14T18:51:35.466Z", "dateReserved": "2022-10-27T18:53:39.754Z", "dateUpdated": "2024-08-02T09:05:36.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46748
Vulnerability from cvelistv5
Published
2023-11-14 18:50
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AMD Software: Adrenalin Edition 23.7.1 ", "platforms": [ "x86" ], "product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AMD Software: PRO Edition 23.Q3 ", "platforms": [ "x86" ], "product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "Radeon\u2122 RX Vega Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "Radeon\u2122 PRO WX Vega Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-11-14T18:50:52.470Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" } ], "source": { "advisory": "AMD-SB-6003", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46748", "datePublished": "2023-11-14T18:50:52.470Z", "dateReserved": "2022-03-31T16:50:27.865Z", "dateUpdated": "2024-08-04T05:17:42.605Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26393
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 21:58
Severity ?
EPSS score ?
Summary
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" }, { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series", "vendor": "AMD", "versions": [ { "lessThan": "22.5.2", "status": "affected", "version": "AMD Radeon Software", "versionType": "custom" }, { "lessThan": "22.Q2", "status": "affected", "version": "AMD Radeon Pro Software Enterprise", "versionType": "custom" }, { "lessThan": "22.10.20", "status": "affected", "version": "Enterprise Driver", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series", "vendor": "AMD", "versions": [ { "lessThan": "22.5.2", "status": "affected", "version": "AMD Radeon Software", "versionType": "custom" }, { "lessThan": "22.Q2", "status": "affected", "version": "AMD Radeon Pro Software Enterprise", "versionType": "custom" }, { "lessThan": "22.10.20", "status": "affected", "version": "Enterprise Driver", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded R1000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded R2000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded V1000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded V2000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-11-08T05:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eInsufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.\u003c/p\u003e" } ], "value": "Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality." } ], "providerMetadata": { "dateUpdated": "2024-02-13T19:22:50.269Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" }, { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001" } ], "source": { "advisory": "AMD-SB-1029, AMD-SB-5001", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26393", "datePublished": "2022-11-09T20:44:25.517806Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T21:58:26.137Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31307
Vulnerability from cvelistv5
Published
2024-08-13 16:54
Modified
2024-12-03 16:30
Severity ?
EPSS score ?
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon™ RX 6000 Series Graphics Cards | |||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-31307", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T18:03:11.598841Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-129", "description": "CWE-129 Improper Validation of Array Index", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T16:30:08.173Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)" } ] }, { "defaultStatus": "affected", "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: PRO Edition 23.Q4 (23.30.13.03)" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u0026nbsp; \u0026nbsp;Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service." } ], "value": "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:54:03.514Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-31307", "datePublished": "2024-08-13T16:54:03.514Z", "dateReserved": "2023-04-27T15:25:41.422Z", "dateUpdated": "2024-12-03T16:30:08.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26391
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 17:33
Severity ?
EPSS score ?
Summary
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series", "vendor": "AMD", "versions": [ { "lessThan": "22.5.2", "status": "affected", "version": "AMD Radeon Software", "versionType": "custom" }, { "lessThan": "22.Q2", "status": "affected", "version": "AMD Radeon Pro Software Enterprise", "versionType": "custom" }, { "lessThan": "22.10.20", "status": "affected", "version": "Enterprise Driver", "versionType": "custom" } ] }, { "product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series", "vendor": "AMD", "versions": [ { "lessThan": "22.5.2", "status": "affected", "version": "AMD Radeon Software", "versionType": "custom" }, { "lessThan": "22.Q2", "status": "affected", "version": "AMD Radeon Pro Software Enterprise", "versionType": "custom" }, { "lessThan": "22.10.20", "status": "affected", "version": "Enterprise Driver", "versionType": "custom" } ] } ], "datePublic": "2022-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel." } ], "problemTypes": [ { "descriptions": [ { "description": "TBD", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-09T00:00:00", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" } ], "source": { "advisory": "AMD-SB-1029", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26391", "datePublished": "2022-11-09T20:44:25.253369Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:33:16.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26392
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 20:51
Severity ?
EPSS score ?
Summary
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" }, { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series", "vendor": "AMD", "versions": [ { "lessThan": "22.5.2", "status": "affected", "version": "AMD Radeon Software", "versionType": "custom" }, { "lessThan": "22.Q2", "status": "affected", "version": "AMD Radeon Pro Software Enterprise", "versionType": "custom" }, { "lessThan": "22.10.20", "status": "affected", "version": "Enterprise Driver", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series", "vendor": "AMD", "versions": [ { "lessThan": "22.5.2", "status": "affected", "version": "AMD Radeon Software", "versionType": "custom" }, { "lessThan": "22.Q2", "status": "affected", "version": "AMD Radeon Pro Software Enterprise", "versionType": "custom" }, { "lessThan": "22.10.20", "status": "affected", "version": "Enterprise Driver", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded R1000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded R2000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded 5000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded V1000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded V2000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122Embedded V3000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-11-08T05:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eInsufficient verification of missing size check in \u0027LoadModule\u0027 may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.\u003c/p\u003e" } ], "value": "Insufficient verification of missing size check in \u0027LoadModule\u0027 may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA." } ], "providerMetadata": { "dateUpdated": "2024-02-13T19:22:08.137Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" }, { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001" } ], "source": { "advisory": "AMD-SB-1029, AMD-SB-5001", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26392", "datePublished": "2022-11-09T20:44:26.258839Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T20:51:46.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20598
Vulnerability from cvelistv5
Published
2023-10-17 13:26
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000 Series Graphics Cards |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "radeon_rx_5300_xt", "vendor": "amd", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_5_7645hx", "vendor": "amd", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_9_pro_7945", "vendor": "amd", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20598", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-27T17:12:05.139002Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-27T17:12:23.788Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 RX 5000 Series Graphics Cards", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 RX 6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 RX 7000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 PRO W5000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 PRO W6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 PRO W7000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Ryzen\u2122 7045 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": " Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Ryzen\u2122 7040 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Ryzen\u2122 7000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-10-16T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\n\n\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eAn improper privilege management in the AMD Radeon\u2122\u003c/span\u003e\u0026nbsp;\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eGraphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\u003c/span\u003e\n\n\n\n" } ], "value": "\n\n\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-10-17T13:26:21.731Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009" } ], "source": { "advisory": "\u202f\u202fAMD-SB-6009", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20598", "datePublished": "2023-10-17T13:26:21.731Z", "dateReserved": "2022-10-27T18:53:39.763Z", "dateUpdated": "2024-08-02T09:05:36.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20510
Vulnerability from cvelistv5
Published
2024-08-13 16:52
Modified
2024-11-21 15:32
Severity ?
EPSS score ?
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon™ RX 6000 Series Graphics Cards | |||||
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20510", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T18:03:49.594825Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-21T15:32:34.695Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)" } ] }, { "defaultStatus": "affected", "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: PRO Edition 23.Q4 (23.30.13.03)" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service." } ], "value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:52:11.777Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20510", "datePublished": "2024-08-13T16:52:11.777Z", "dateReserved": "2022-10-27T18:53:39.735Z", "dateUpdated": "2024-11-21T15:32:34.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26367
Vulnerability from cvelistv5
Published
2024-08-13 16:50
Modified
2024-12-04 16:25
Severity ?
EPSS score ?
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-26367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T18:04:31.680686Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:25:09.987Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4v2 PI 1.2.0.5" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4PI 1.0.0.9" }, { "status": "unaffected", "version": "ComboAM4v2 PI 1.2.0.8" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4v2 PI 1.2.0.5" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PicassoPI-FP5 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PollockPI-FT5 1.0.0.4" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PicassoPI-FP5 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RenoirPI-FP6 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)" } ] }, { "defaultStatus": "affected", "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: PRO Edition 23.Q4 (23.30.13.03)" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP5 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedR2KPI-FP5 1.0.0.2" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP5 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V2000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP6 1.0.0.6" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability." } ], "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:50:05.825Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html" }, { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26367", "datePublished": "2024-08-13T16:50:05.825Z", "dateReserved": "2021-01-29T21:24:26.151Z", "dateUpdated": "2024-12-04T16:25:09.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-31320
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 14:53
Severity ?
EPSS score ?
Summary
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:30.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AMD Software: Adrenalin Edition 23.7.1 ", "platforms": [ "x86" ], "product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AMD Software: PRO Edition 23.Q3 ", "platforms": [ "x86" ], "product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "Radeon\u2122 RX Vega Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "Radeon\u2122 PRO WX Vega Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-11-14T18:51:43.415Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" } ], "source": { "advisory": "AMD-SB-6003", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-31320", "datePublished": "2023-11-14T18:51:43.415Z", "dateReserved": "2023-04-27T15:25:41.423Z", "dateUpdated": "2024-08-02T14:53:30.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20567
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AMD Software: Adrenalin Edition 23.7.1 ", "platforms": [ "x86" ], "product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AMD Software: PRO Edition 23.Q3 ", "platforms": [ "x86" ], "product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "Radeon\u2122 RX Vega Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "Radeon\u2122 PRO WX Vega Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-11-14T18:51:25.340Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" } ], "source": { "advisory": "AMD-SB-6003", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20567", "datePublished": "2023-11-14T18:51:25.340Z", "dateReserved": "2022-10-27T18:53:39.753Z", "dateUpdated": "2024-08-02T09:05:36.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | enterprise_driver | * | |
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9", "versionEndExcluding": "22.10.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643", "versionEndExcluding": "22.q2", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A", "versionEndExcluding": "22.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel." }, { "lang": "es", "value": "La verificaci\u00f3n insuficiente de m\u00faltiples firmas de encabezado mientras se carga una aplicaci\u00f3n confiable (TA) puede permitir que un atacante con privilegios obtenga la ejecuci\u00f3n de c\u00f3digo en esa TA o el sistema operativo/kernel." } ], "id": "CVE-2021-26391", "lastModified": "2024-11-21T05:56:16.620", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-09T21:15:12.150", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:28
Severity ?
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_software | * | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094", "versionEndExcluding": "23.12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0", "versionEndIncluding": "23.q4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service." }, { "lang": "es", "value": "Una validaci\u00f3n de direcci\u00f3n DRAM insuficiente en PMFW puede permitir que un atacante privilegiado lea desde una direcci\u00f3n DRAM no v\u00e1lida a SRAM, lo que podr\u00eda provocar corrupci\u00f3n de datos o denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20510", "lastModified": "2024-12-12T20:28:55.010", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 4.2, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:18.777", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-13 16:30
Severity ?
2.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_software | * | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094", "versionEndExcluding": "23.12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0", "versionEndIncluding": "23.q4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service." }, { "lang": "es", "value": "La validaci\u00f3n inadecuada del \u00edndice de matriz en el firmware de administraci\u00f3n de energ\u00eda (PMFW) puede permitir que un atacante privilegiado provoque una lectura de memoria fuera de los l\u00edmites dentro de PMFW, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-31307", "lastModified": "2024-12-13T16:30:30.840", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 1.4, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:20.500", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-129" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-129" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:34
Severity ?
Summary
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
psirt@amd.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | radeon_rx_vega_m_firmware | * | |
intel | core_i5-8305g | - | |
intel | core_i7-8705g | - | |
intel | core_i7-8706g | - | |
intel | core_i7-8709g | - | |
intel | nuc_8_enthusiast_nuc8i7hnkqc | - | |
intel | nuc_8_enthusiast_nuc8i7hvkva | - | |
intel | nuc_8_enthusiast_nuc8i7hvkvaw | - | |
intel | nuc_kit_nuc8i7hnk | - | |
intel | nuc_kit_nuc8i7hvk | - | |
amd | radeon_software | * | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_7600 | - | |
amd | radeon_rx_7600m | - | |
amd | radeon_rx_7600m_xt | - | |
amd | radeon_rx_7600s | - | |
amd | radeon_rx_7700_xt | - | |
amd | radeon_rx_7700s | - | |
amd | radeon_rx_7800_xt | - | |
amd | radeon_rx_7900_gre | - | |
amd | radeon_rx_7900_xt | - | |
amd | radeon_rx_7900_xtx | - | |
amd | radeon_rx_7900m | - | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_pro_w7500 | - | |
amd | radeon_pro_w7600 | - | |
amd | radeon_pro_w7800 | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | radeon_pro_vega_56_firmware | - | |
amd | radeon_pro_vega_56 | - | |
amd | radeon_pro_vega_64_firmware | - | |
amd | radeon_pro_vega_64 | - | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | ryzen_3_3015ce | - | |
amd | ryzen_3_3015e | - | |
amd | ryzen_3_4100 | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_4500 | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600hs | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_4680u | - | |
amd | ryzen_5_5500h | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_pro_3200g | - | |
amd | ryzen_5_pro_3200ge | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800hs | - | |
amd | ryzen_7_4980u | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_4900hs | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4", "versionEndExcluding": "23.10.01.46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1A4CCCB-01CC-4488-9336-C0C379ABE609", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135", "versionEndExcluding": "23.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467", "versionEndExcluding": "23.q3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135", "versionEndExcluding": "23.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467", "versionEndExcluding": "23.q3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*", "matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*", "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "Una verificaci\u00f3n de l\u00edmites insuficiente en el ASP (AMD Secure Processor) puede permitir que un atacante acceda a la memoria fuera de los l\u00edmites de lo permitido para una TA (Trusted Application), lo que resulta en una posible denegaci\u00f3n de servicio." } ], "id": "CVE-2021-46748", "lastModified": "2024-11-21T06:34:37.687", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:10.267", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:41
Severity ?
5.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_software | * | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - | |
amd | ryzen_9_5980hx_firmware | * | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_3_3300u_firmware | * | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3350u_firmware | * | |
amd | ryzen_3_3350u | - | |
amd | ryzen_5_3450u_firmware | * | |
amd | ryzen_5_3450u | - | |
amd | ryzen_5_3500u_firmware | * | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3500c_firmware | * | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3550h_firmware | * | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | * | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_3700u_firmware | * | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700c_firmware | * | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3750h_firmware | * | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | * | |
amd | ryzen_7_3780u | - | |
amd | athlon_gold_3150c_firmware | * | |
amd | athlon_gold_3150c | - | |
amd | athlon_gold_3150u_firmware | * | |
amd | athlon_gold_3150u | - | |
amd | athlon_pro_3145b_firmware | * | |
amd | athlon_pro_3145b | - | |
amd | athlon_silver_3050c_firmware | * | |
amd | athlon_silver_3050c | - | |
amd | athlon_silver_3050u_firmware | * | |
amd | athlon_silver_3050u | - | |
amd | athlon_pro_3045b_firmware | * | |
amd | athlon_pro_3045b | - | |
amd | athlon_silver_3050e_firmware | * | |
amd | athlon_silver_3050e | - | |
amd | athlon_gold_pro_3150g_firmware | * | |
amd | athlon_gold_pro_3150g | - | |
amd | athlon_gold_3150g_firmware | * | |
amd | athlon_gold_3150g | - | |
amd | athlon_gold_pro_3150ge_firmware | * | |
amd | athlon_gold_pro_3150ge | - | |
amd | athlon_pro_300ge_firmware | * | |
amd | athlon_pro_300ge | - | |
amd | ryzen_3_4300ge_firmware | * | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_5_4600ge_firmware | * | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_7_4700ge_firmware | * | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_3_4300g_firmware | * | |
amd | ryzen_3_4300g | - | |
amd | ryzen_5_4600g_firmware | * | |
amd | ryzen_5_4600g | - | |
amd | ryzen_7_4700g_firmware | * | |
amd | ryzen_7_4700g | - | |
amd | ryzen_3_5300ge_firmware | * | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | * | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | * | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | * | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | * | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | * | |
amd | ryzen_7_5700g | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094", "versionEndExcluding": "23.12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0", "versionEndIncluding": "23.q4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1EFDD49-95E7-4E92-A476-9F7E9D2B222A", "versionEndExcluding": "cezannepi-fp6_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "799912F4-2A5D-41F6-B645-5972B966617B", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D7DEDAC-51F3-4B72-8958-72CFDB8572A0", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15FE9FAE-DEC6-42FA-8622-3D5B0C845928", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3770F180-FB7C-410F-B49D-D30AA05326BC", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF809F01-E6B3-4975-AC8B-EE2FDD199B14", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F2AC7D6-47AB-4178-9585-34293B36F576", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C05D78A9-2CED-4BA1-8382-BC8D722E91D9", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8233A5D0-7796-4164-99CF-BB23B74563DF", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03194384-10A2-4B6D-BED1-C01908249969", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03BCFD6B-04D1-4A27-AB06-90F8BA894E2C", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "754DE9E2-F441-4D7F-BDAB-6ADED0F9D76A", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A192415A-41F1-4DF9-A351-A6E879E45431", "versionEndExcluding": "comboam4pi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76F10B69-9959-4977-893B-076BFBAC1BA6", "versionEndExcluding": "comboam4pi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7217BA72-D101-49C1-86B7-A63BFA01A056", "versionEndExcluding": "comboam4pi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "045D34B9-50A3-453D-A9E1-64180D1E1B5C", "versionEndExcluding": "comboam4pi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C52E5C9A-DC2E-428F-97CF-61C7340C0579", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62AB8A11-9C17-4528-A582-8340964C76A7", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E240139-34E9-4D68-AEBB-6E641C75AB82", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B184CA4-DA2E-4EF7-997C-BA563CB41A08", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40EDD65C-1101-4F0C-AD08-007A97D7184E", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DCE8037-1ED8-468A-9FBF-B79809A8089A", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2201670-E611-4C1E-BD06-E2B4262C3687", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B0598FA-5EB7-41FF-AC46-BFBCE1EA1271", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C51F223-5529-4D10-A7AF-44198DE58684", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35C8C0CE-AA13-434D-83BD-2DA454B1937C", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5A8225E-A53A-4602-ACF6-F142D1CCF9FD", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF3486C1-EAD5-4861-8463-506D59A5F7DA", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability." }, { "lang": "es", "value": "Un atacante malicioso en x86 puede configurar mal las regiones de memoria confiable (TMR), lo que puede permitirle establecer un rango de direcciones arbitrario para la TMR, lo que podr\u00eda provocar una p\u00e9rdida de integridad y disponibilidad." } ], "id": "CVE-2021-26367", "lastModified": "2024-12-12T20:41:56.120", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.2, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:17.360", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
psirt@amd.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | radeon_rx_vega_m_firmware | * | |
intel | core_i5-8305g | - | |
intel | core_i7-8705g | - | |
intel | core_i7-8706g | - | |
intel | core_i7-8709g | - | |
intel | nuc_8_enthusiast_nuc8i7hnkqc | - | |
intel | nuc_8_enthusiast_nuc8i7hvkva | - | |
intel | nuc_8_enthusiast_nuc8i7hvkvaw | - | |
intel | nuc_kit_nuc8i7hnk | - | |
intel | nuc_kit_nuc8i7hvk | - | |
amd | radeon_software | * | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_7600 | - | |
amd | radeon_rx_7600m | - | |
amd | radeon_rx_7600m_xt | - | |
amd | radeon_rx_7600s | - | |
amd | radeon_rx_7700_xt | - | |
amd | radeon_rx_7700s | - | |
amd | radeon_rx_7800_xt | - | |
amd | radeon_rx_7900_gre | - | |
amd | radeon_rx_7900_xt | - | |
amd | radeon_rx_7900_xtx | - | |
amd | radeon_rx_7900m | - | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_pro_w7500 | - | |
amd | radeon_pro_w7600 | - | |
amd | radeon_pro_w7800 | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | radeon_pro_vega_56_firmware | - | |
amd | radeon_pro_vega_56 | - | |
amd | radeon_pro_vega_64_firmware | - | |
amd | radeon_pro_vega_64 | - | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | ryzen_3_3015ce | - | |
amd | ryzen_3_3015e | - | |
amd | ryzen_3_4100 | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_4500 | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600hs | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_4680u | - | |
amd | ryzen_5_5500h | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_pro_3200g | - | |
amd | ryzen_5_pro_3200ge | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800hs | - | |
amd | ryzen_7_4980u | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_4900hs | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4", "versionEndExcluding": "23.10.01.46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1A4CCCB-01CC-4488-9336-C0C379ABE609", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135", "versionEndExcluding": "23.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467", "versionEndExcluding": "23.q3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135", "versionEndExcluding": "23.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467", "versionEndExcluding": "23.q3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*", "matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*", "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "La verificaci\u00f3n inadecuada de la firma del controlador RadeonTM RX Vega M Graphics para Windows puede permitir que un atacante con privilegios de administrador inicie RadeonInstaller.exe sin validar la firma del archivo, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2023-20568", "lastModified": "2024-11-21T07:41:08.400", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:15.930", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | enterprise_driver | * | |
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | ryzen_3_2200ge_firmware | - | |
amd | ryzen_3_2200ge | - | |
amd | ryzen_3_2200g_firmware | - | |
amd | ryzen_3_2200g | - | |
amd | ryzen_5_2400ge_firmware | - | |
amd | ryzen_5_2400ge | - | |
amd | ryzen_5_2400g_firmware | - | |
amd | ryzen_5_2400g | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | athlon_silver_3050e_firmware | - | |
amd | athlon_silver_3050e | - | |
amd | athlon_pro_3045b_firmware | - | |
amd | athlon_pro_3045b | - | |
amd | athlon_silver_3050u_firmware | - | |
amd | athlon_silver_3050u | - | |
amd | athlon_silver_3050c_firmware | - | |
amd | athlon_silver_3050c | - | |
amd | athlon_pro_3145b_firmware | - | |
amd | athlon_pro_3145b | - | |
amd | athlon_gold_3150u_firmware | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_gold_3150c_firmware | - | |
amd | athlon_gold_3150c | - | |
amd | ryzen_3_3250u_firmware | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3250c_firmware | - | |
amd | ryzen_3_3250c | - | |
amd | amd_3020e_firmware | - | |
amd | amd_3020e | - | |
amd | amd_3015e_firmware | - | |
amd | amd_3015e | - | |
amd | amd_3015ce_firmware | - | |
amd | amd_3015ce | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3350u_firmware | - | |
amd | ryzen_3_3350u | - | |
amd | ryzen_5_3450u_firmware | - | |
amd | ryzen_5_3450u | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3500c_firmware | - | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700c_firmware | - | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_3_pro_3200ge_firmware | - | |
amd | ryzen_3_pro_3200ge | - | |
amd | ryzen_3_3200g_firmware | - | |
amd | ryzen_3_3200g | - | |
amd | ryzen_3_pro_3200g_firmware | - | |
amd | ryzen_3_pro_3200g | - | |
amd | ryzen_5_pro_3350ge_firmware | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3350g_firmware | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3400ge_firmware | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_5_pro_3400g_firmware | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9", "versionEndExcluding": "22.10.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643", "versionEndExcluding": "22.q2", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A", "versionEndExcluding": "22.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E3B591-EBC2-4C6A-8574-33F27F9AAE17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6882B4E1-0BFF-4093-BE67-72294949C3F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E741A31-8265-45E0-9834-23D00D5F8176", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "07D642E6-4D91-49C3-B8BB-8B4575CE99D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1902D5CE-4BBB-45F7-9D52-28AF43F460CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "913A2DC9-4215-486B-BD15-3AF515E3CDCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DF8A936-58AE-44BB-897E-44782232394F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9FC3889-3F62-48AC-876D-5A630A5E2AD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79E460A-D34C-4120-8529-F32988793DC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "069392FC-51DB-49F0-B30B-8ED46C694057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D4403E-C626-4817-B0C9-ECEC420C517D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58EE3F9B-6950-4F83-B0BE-ADA560457BC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "945182A3-1BE3-459D-BC45-5554FB905C3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality." }, { "lang": "es", "value": "Una limpieza de memoria insuficiente en AMD Secure Processor (ASP) Trusted Execution Environment (TEE) puede permitir que un atacante autenticado con privilegios genere un TA firmado v\u00e1lido y potencialmente envenenar el contenido de la memoria del proceso con datos controlados por el atacante, lo que resulta en una p\u00e9rdida de confidencialidad." } ], "id": "CVE-2021-26393", "lastModified": "2024-11-21T05:56:17.503", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-09T21:15:12.607", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | enterprise_driver | * | |
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9", "versionEndExcluding": "22.10.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643", "versionEndExcluding": "22.q2", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A", "versionEndExcluding": "22.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor\u2019s encrypted memory contents which may lead to arbitrary code execution in ASP." }, { "lang": "es", "value": "Un atacante con acceso local al sistema puede realizar modificaciones no autorizadas en la configuraci\u00f3n de seguridad de los registros SOC. Esto podr\u00eda permitir una posible corrupci\u00f3n del contenido de la memoria cifrada del procesador seguro AMD, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en ASP." } ], "id": "CVE-2021-26360", "lastModified": "2024-11-21T05:56:12.317", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-09T21:15:11.690", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
psirt@amd.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | radeon_rx_vega_m_firmware | * | |
intel | core_i5-8305g | - | |
intel | core_i7-8705g | - | |
intel | core_i7-8706g | - | |
intel | core_i7-8709g | - | |
intel | nuc_8_enthusiast_nuc8i7hnkqc | - | |
intel | nuc_8_enthusiast_nuc8i7hvkva | - | |
intel | nuc_8_enthusiast_nuc8i7hvkvaw | - | |
intel | nuc_kit_nuc8i7hnk | - | |
intel | nuc_kit_nuc8i7hvk | - | |
amd | radeon_software | * | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_7600 | - | |
amd | radeon_rx_7600m | - | |
amd | radeon_rx_7600m_xt | - | |
amd | radeon_rx_7600s | - | |
amd | radeon_rx_7700_xt | - | |
amd | radeon_rx_7700s | - | |
amd | radeon_rx_7800_xt | - | |
amd | radeon_rx_7900_gre | - | |
amd | radeon_rx_7900_xt | - | |
amd | radeon_rx_7900_xtx | - | |
amd | radeon_rx_7900m | - | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_pro_w7500 | - | |
amd | radeon_pro_w7600 | - | |
amd | radeon_pro_w7800 | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | radeon_pro_vega_56_firmware | - | |
amd | radeon_pro_vega_56 | - | |
amd | radeon_pro_vega_64_firmware | - | |
amd | radeon_pro_vega_64 | - | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | ryzen_3_3015ce | - | |
amd | ryzen_3_3015e | - | |
amd | ryzen_3_4100 | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_4500 | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600hs | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_4680u | - | |
amd | ryzen_5_5500h | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_pro_3200g | - | |
amd | ryzen_5_pro_3200ge | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800hs | - | |
amd | ryzen_7_4980u | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_4900hs | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4", "versionEndExcluding": "23.10.01.46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1A4CCCB-01CC-4488-9336-C0C379ABE609", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135", "versionEndExcluding": "23.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467", "versionEndExcluding": "23.q3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135", "versionEndExcluding": "23.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467", "versionEndExcluding": "23.q3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*", "matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*", "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "La verificaci\u00f3n inadecuada de la firma del controlador RadeonTM RX Vega M Graphics para Windows puede permitir que un atacante con privilegios de administrador inicie AMDSoftwareInstaller.exe sin validar la firma del archivo, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2023-20567", "lastModified": "2024-11-21T07:41:08.253", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:15.880", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | enterprise_driver | * | |
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | ryzen_3_2200ge_firmware | - | |
amd | ryzen_3_2200ge | - | |
amd | ryzen_3_2200g_firmware | - | |
amd | ryzen_3_2200g | - | |
amd | ryzen_5_2400ge_firmware | - | |
amd | ryzen_5_2400ge | - | |
amd | ryzen_5_2400g_firmware | - | |
amd | ryzen_5_2400g | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3900xt_firmware | - | |
amd | ryzen_9_3900xt | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_5_5500_firmware | - | |
amd | ryzen_5_5500 | - | |
amd | ryzen_5_5600_firmware | - | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_7_5700x_firmware | - | |
amd | ryzen_7_5700x | - | |
amd | ryzen_7_5800x_firmware | - | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | - | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5800x3d_firmware | - | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_9_5900_firmware | - | |
amd | ryzen_9_5900 | - | |
amd | ryzen_9_5900x_firmware | - | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5950x_firmware | - | |
amd | ryzen_9_5950x | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | athlon_silver_3050e_firmware | - | |
amd | athlon_silver_3050e | - | |
amd | athlon_pro_3045b_firmware | - | |
amd | athlon_pro_3045b | - | |
amd | athlon_silver_3050u_firmware | - | |
amd | athlon_silver_3050u | - | |
amd | athlon_silver_3050c_firmware | - | |
amd | athlon_silver_3050c | - | |
amd | athlon_pro_3145b_firmware | - | |
amd | athlon_pro_3145b | - | |
amd | athlon_gold_3150u_firmware | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_gold_3150c_firmware | - | |
amd | athlon_gold_3150c | - | |
amd | ryzen_3_3250u_firmware | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3250c_firmware | - | |
amd | ryzen_3_3250c | - | |
amd | amd_3020e_firmware | - | |
amd | amd_3020e | - | |
amd | amd_3015e_firmware | - | |
amd | amd_3015e | - | |
amd | amd_3015ce_firmware | - | |
amd | amd_3015ce | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3350u_firmware | - | |
amd | ryzen_3_3350u | - | |
amd | ryzen_5_3450u_firmware | - | |
amd | ryzen_5_3450u | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3500c_firmware | - | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700c_firmware | - | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_3_pro_3200ge_firmware | - | |
amd | ryzen_3_pro_3200ge | - | |
amd | ryzen_3_3200g_firmware | - | |
amd | ryzen_3_3200g | - | |
amd | ryzen_3_pro_3200g_firmware | - | |
amd | ryzen_3_pro_3200g | - | |
amd | ryzen_5_pro_3350ge_firmware | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3350g_firmware | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3400ge_firmware | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_5_pro_3400g_firmware | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*", "matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9", "versionEndExcluding": "22.10.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643", "versionEndExcluding": "22.q2", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A", "versionEndExcluding": "22.5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4350ADE3-9A31-4A23-9B15-7A44E8F29E90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "777D94BA-613B-49E9-B1B3-2A9E0FC35908", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E3B591-EBC2-4C6A-8574-33F27F9AAE17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6882B4E1-0BFF-4093-BE67-72294949C3F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E741A31-8265-45E0-9834-23D00D5F8176", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "07D642E6-4D91-49C3-B8BB-8B4575CE99D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1902D5CE-4BBB-45F7-9D52-28AF43F460CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "913A2DC9-4215-486B-BD15-3AF515E3CDCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DF8A936-58AE-44BB-897E-44782232394F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9FC3889-3F62-48AC-876D-5A630A5E2AD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D79E460A-D34C-4120-8529-F32988793DC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "069392FC-51DB-49F0-B30B-8ED46C694057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51D4403E-C626-4817-B0C9-ECEC420C517D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58EE3F9B-6950-4F83-B0BE-ADA560457BC1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "945182A3-1BE3-459D-BC45-5554FB905C3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient verification of missing size check in \u0027LoadModule\u0027 may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA." }, { "lang": "es", "value": "Una verificaci\u00f3n insuficiente del tama\u00f1o faltante en \u0027LoadModule\u0027 puede provocar una escritura fuera de l\u00edmites que podr\u00eda permitir que un atacante con privilegios obtenga la ejecuci\u00f3n de c\u00f3digo del sistema operativo/kernel cargando un TA malicioso." } ], "id": "CVE-2021-26392", "lastModified": "2024-11-21T05:56:16.773", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-09T21:15:12.360", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 08:01
Severity ?
Summary
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_7600 | - | |
amd | radeon_rx_7600m | - | |
amd | radeon_rx_7600m_xt | - | |
amd | radeon_rx_7600s | - | |
amd | radeon_rx_7700_xt | - | |
amd | radeon_rx_7700s | - | |
amd | radeon_rx_7800_xt | - | |
amd | radeon_rx_7900_gre | - | |
amd | radeon_rx_7900_xt | - | |
amd | radeon_rx_7900_xtx | - | |
amd | radeon_rx_7900m | - | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_pro_w7500 | - | |
amd | radeon_pro_w7600 | - | |
amd | radeon_pro_w7800 | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | radeon_pro_vega_56_firmware | - | |
amd | radeon_pro_vega_56 | - | |
amd | radeon_pro_vega_64_firmware | - | |
amd | radeon_pro_vega_64 | - | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | ryzen_3_3015ce | - | |
amd | ryzen_3_3015e | - | |
amd | ryzen_3_4100 | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_4500 | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600hs | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_4680u | - | |
amd | ryzen_5_5500h | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_pro_3200g | - | |
amd | ryzen_5_pro_3200ge | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800hs | - | |
amd | ryzen_7_4980u | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_4900hs | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135", "versionEndExcluding": "23.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467", "versionEndExcluding": "23.q3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*", "matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135", "versionEndExcluding": "23.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467", "versionEndExcluding": "23.q3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*", "matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*", "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "Una validaci\u00f3n de entrada incorrecta en el controlador de pantalla AMD RadeonTM Graphics puede permitir que un atacante da\u00f1e la pantalla, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-31320", "lastModified": "2024-11-21T08:01:46.340", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:25.070", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-17 14:15
Modified
2024-11-21 07:41
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre_10gb | - | |
amd | radeon_rx_6750_gre_12gb | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_7600 | - | |
amd | radeon_rx_7600m | - | |
amd | radeon_rx_7600m_xt | - | |
amd | radeon_rx_7600s | - | |
amd | radeon_rx_7700_xt | - | |
amd | radeon_rx_7700s | - | |
amd | radeon_rx_7800_xt | - | |
amd | radeon_rx_7900_gre | - | |
amd | radeon_rx_7900_xt | - | |
amd | radeon_rx_7900_xtx | - | |
amd | radeon_rx_7900m | - | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w7500 | - | |
amd | radeon_pro_w7600 | - | |
amd | radeon_pro_w7800 | - | |
amd | radeon_pro_w7900 | - | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | ryzen_3_7320u | - | |
amd | ryzen_3_7335u | - | |
amd | ryzen_3_7440u | - | |
amd | ryzen_5_6600h | - | |
amd | ryzen_5_6600hs | - | |
amd | ryzen_5_6600u | - | |
amd | ryzen_5_7500f | - | |
amd | ryzen_5_7520u | - | |
amd | ryzen_5_7535hs | - | |
amd | ryzen_5_7535u | - | |
amd | ryzen_5_7540u | - | |
amd | ryzen_5_7600 | - | |
amd | ryzen_5_7600x | - | |
amd | ryzen_5_7640h | - | |
amd | ryzen_5_7640u | - | |
amd | ryzen_5_7645hx | - | |
amd | ryzen_5_pro_7640hs | - | |
amd | ryzen_5_pro_7645 | - | |
amd | ryzen_7_6800h | - | |
amd | ryzen_7_6800hs | - | |
amd | ryzen_7_6800u | - | |
amd | ryzen_7_7700 | - | |
amd | ryzen_7_7700x | - | |
amd | ryzen_7_7735hs | - | |
amd | ryzen_7_7735u | - | |
amd | ryzen_7_7736u | - | |
amd | ryzen_7_7745hx | - | |
amd | ryzen_7_7800x3d | - | |
amd | ryzen_7_7840h | - | |
amd | ryzen_7_7840u | - | |
amd | ryzen_7_pro_7745 | - | |
amd | ryzen_7_pro_7840hs | - | |
amd | ryzen_9_6900hs | - | |
amd | ryzen_9_6900hx | - | |
amd | ryzen_9_6980hs | - | |
amd | ryzen_9_6980hx | - | |
amd | ryzen_9_7845hx | - | |
amd | ryzen_9_7900 | - | |
amd | ryzen_9_7900x | - | |
amd | ryzen_9_7900x3d | - | |
amd | ryzen_9_7940h | - | |
amd | ryzen_9_7945hx | - | |
amd | ryzen_9_7945hx3d | - | |
amd | ryzen_9_7950x | - | |
amd | ryzen_9_7950x3d | - | |
amd | ryzen_9_pro_7940hs | - | |
amd | ryzen_9_pro_7945 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "7162DB91-6B5C-4575-A8D0-B83B34908BE5", "versionEndExcluding": "23.9.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BB37AAC-3957-4840-B47E-ED678F0B6044", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1DA067-DE94-4663-91CD-A70CC386D45A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "2841E9B4-728C-4201-AAF1-3250A1DC08F3", "versionEndExcluding": "23.q4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFF5CD86-64D3-4F02-9971-AC50E8052986", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "7162DB91-6B5C-4575-A8D0-B83B34908BE5", "versionEndExcluding": "23.9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "2841E9B4-728C-4201-AAF1-3250A1DC08F3", "versionEndExcluding": "23.q4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*", "matchCriteriaId": "48F04B9F-8C65-476B-B5D8-18CC96E3B712", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", "matchCriteriaId": "495E436C-B0EE-4B72-AB49-332F4752C140", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C4FDE72-050C-4A72-A4F4-9C1D5273CADD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", "matchCriteriaId": "1232B034-1214-4F9A-823D-DC76D5C5956B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0870FBE4-92B4-4717-88B0-EC1094268034", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE36D471-57BF-4385-A825-029F7313E4DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", "matchCriteriaId": "082BE536-F29C-4A73-B030-A19DD3A448B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*", "matchCriteriaId": "36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6740A06F-4512-427D-9CB9-A4A6DB046BA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C05D51F-469D-487D-9FC8-E1AD699A6F74", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BC5E111-A7AA-4A45-A2E3-47013F9135D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5D5B25-F32A-493E-BD54-57098981E15A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E3657C6-1047-4CA9-8D44-C7143F7D877D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2787C72-42D5-42B0-BE5B-E548B319BCF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "76121981-8DC2-4779-833E-4B15CFCF7FC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "225E8405-04FF-4885-92C8-8581ACC66E06", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D50E8EA-ECB2-463D-BA51-D13CF5A02266", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "69289284-2ED2-4D8B-8AE2-B835AAF31EAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA6CD984-A8C7-4B23-8FF9-896C503EBA37", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2D0429F-F186-4F78-9AE0-574E3A39926D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", "matchCriteriaId": "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8480A7E0-882C-4B03-ADBC-697304B0B7C5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD27234D-ACFC-4144-8980-2B706822C579", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5602B902-9FDB-4946-BE4C-236262285F2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA666DF3-C5F3-4127-A8EE-B784DD41F642", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "86CAA682-9666-4929-B1AC-D9DB3109DB1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A7E6806-A7AC-4C96-960B-B8934CEA2439", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "74DD4A40-B712-4B54-9CC7-0BFD79E917BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "82CCEE11-392D-4486-A6AD-CB64FB8B7081", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05C8669-6348-4A1B-B1D4-D22022E1F67E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "018A02C9-2A5C-43E2-8CCD-4D03C119C22B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3DE32CA-168F-4812-AEAE-D771EB01E15D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\n\n\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n" }, { "lang": "es", "value": "Una gesti\u00f3n de privilegios inadecuada en el controlador de gr\u00e1ficos AMD Radeon\u2122 puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones f\u00edsicas arbitrarias, lo que resulta en una posible ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2023-20598", "lastModified": "2024-11-21T07:41:12.177", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-10-17T14:15:09.813", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }