All the vulnerabilites related to amd - radeon_rx_6750_gre
cve-2023-31307
Vulnerability from cvelistv5
Published
2024-08-13 16:54
Modified
2024-12-03 16:30
Severity ?
EPSS score ?
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon™ RX 6000 Series Graphics Cards | |||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-31307", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T18:03:11.598841Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-129", "description": "CWE-129 Improper Validation of Array Index", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-03T16:30:08.173Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)" } ] }, { "defaultStatus": "affected", "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: PRO Edition 23.Q4 (23.30.13.03)" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u0026nbsp; \u0026nbsp;Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service." } ], "value": "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:54:03.514Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-31307", "datePublished": "2024-08-13T16:54:03.514Z", "dateReserved": "2023-04-27T15:25:41.422Z", "dateUpdated": "2024-12-03T16:30:08.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26367
Vulnerability from cvelistv5
Published
2024-08-13 16:50
Modified
2024-12-04 16:25
Severity ?
EPSS score ?
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-26367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T18:04:31.680686Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:25:09.987Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4v2 PI 1.2.0.5" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4PI 1.0.0.9" }, { "status": "unaffected", "version": "ComboAM4v2 PI 1.2.0.8" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4v2 PI 1.2.0.5" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PicassoPI-FP5 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PollockPI-FT5 1.0.0.4" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PicassoPI-FP5 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RenoirPI-FP6 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)" } ] }, { "defaultStatus": "affected", "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: PRO Edition 23.Q4 (23.30.13.03)" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP5 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedR2KPI-FP5 1.0.0.2" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP5 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V2000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP6 1.0.0.6" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability." } ], "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:50:05.825Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html" }, { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26367", "datePublished": "2024-08-13T16:50:05.825Z", "dateReserved": "2021-01-29T21:24:26.151Z", "dateUpdated": "2024-12-04T16:25:09.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-20510
Vulnerability from cvelistv5
Published
2024-08-13 16:52
Modified
2024-11-21 15:32
Severity ?
EPSS score ?
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon™ RX 6000 Series Graphics Cards | |||||
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20510", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T18:03:49.594825Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-21T15:32:34.695Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)" } ] }, { "defaultStatus": "affected", "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: PRO Edition 23.Q4 (23.30.13.03)" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service." } ], "value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:52:11.777Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20510", "datePublished": "2024-08-13T16:52:11.777Z", "dateReserved": "2022-10-27T18:53:39.735Z", "dateUpdated": "2024-11-21T15:32:34.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:41
Severity ?
5.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_software | * | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - | |
amd | ryzen_9_5980hx_firmware | * | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_3_3300u_firmware | * | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3350u_firmware | * | |
amd | ryzen_3_3350u | - | |
amd | ryzen_5_3450u_firmware | * | |
amd | ryzen_5_3450u | - | |
amd | ryzen_5_3500u_firmware | * | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3500c_firmware | * | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3550h_firmware | * | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | * | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_3700u_firmware | * | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700c_firmware | * | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3750h_firmware | * | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | * | |
amd | ryzen_7_3780u | - | |
amd | athlon_gold_3150c_firmware | * | |
amd | athlon_gold_3150c | - | |
amd | athlon_gold_3150u_firmware | * | |
amd | athlon_gold_3150u | - | |
amd | athlon_pro_3145b_firmware | * | |
amd | athlon_pro_3145b | - | |
amd | athlon_silver_3050c_firmware | * | |
amd | athlon_silver_3050c | - | |
amd | athlon_silver_3050u_firmware | * | |
amd | athlon_silver_3050u | - | |
amd | athlon_pro_3045b_firmware | * | |
amd | athlon_pro_3045b | - | |
amd | athlon_silver_3050e_firmware | * | |
amd | athlon_silver_3050e | - | |
amd | athlon_gold_pro_3150g_firmware | * | |
amd | athlon_gold_pro_3150g | - | |
amd | athlon_gold_3150g_firmware | * | |
amd | athlon_gold_3150g | - | |
amd | athlon_gold_pro_3150ge_firmware | * | |
amd | athlon_gold_pro_3150ge | - | |
amd | athlon_pro_300ge_firmware | * | |
amd | athlon_pro_300ge | - | |
amd | ryzen_3_4300ge_firmware | * | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_5_4600ge_firmware | * | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_7_4700ge_firmware | * | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_3_4300g_firmware | * | |
amd | ryzen_3_4300g | - | |
amd | ryzen_5_4600g_firmware | * | |
amd | ryzen_5_4600g | - | |
amd | ryzen_7_4700g_firmware | * | |
amd | ryzen_7_4700g | - | |
amd | ryzen_3_5300ge_firmware | * | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | * | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | * | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | * | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | * | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | * | |
amd | ryzen_7_5700g | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094", "versionEndExcluding": "23.12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0", "versionEndIncluding": "23.q4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1EFDD49-95E7-4E92-A476-9F7E9D2B222A", "versionEndExcluding": "cezannepi-fp6_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "799912F4-2A5D-41F6-B645-5972B966617B", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D7DEDAC-51F3-4B72-8958-72CFDB8572A0", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15FE9FAE-DEC6-42FA-8622-3D5B0C845928", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3770F180-FB7C-410F-B49D-D30AA05326BC", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF809F01-E6B3-4975-AC8B-EE2FDD199B14", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F2AC7D6-47AB-4178-9585-34293B36F576", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C05D78A9-2CED-4BA1-8382-BC8D722E91D9", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8233A5D0-7796-4164-99CF-BB23B74563DF", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03194384-10A2-4B6D-BED1-C01908249969", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03BCFD6B-04D1-4A27-AB06-90F8BA894E2C", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "754DE9E2-F441-4D7F-BDAB-6ADED0F9D76A", "versionEndExcluding": "picassopi-fp5_1.0.0.e", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A192415A-41F1-4DF9-A351-A6E879E45431", "versionEndExcluding": "comboam4pi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76F10B69-9959-4977-893B-076BFBAC1BA6", "versionEndExcluding": "comboam4pi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7217BA72-D101-49C1-86B7-A63BFA01A056", "versionEndExcluding": "comboam4pi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "045D34B9-50A3-453D-A9E1-64180D1E1B5C", "versionEndExcluding": "comboam4pi_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C52E5C9A-DC2E-428F-97CF-61C7340C0579", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62AB8A11-9C17-4528-A582-8340964C76A7", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E240139-34E9-4D68-AEBB-6E641C75AB82", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B184CA4-DA2E-4EF7-997C-BA563CB41A08", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40EDD65C-1101-4F0C-AD08-007A97D7184E", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DCE8037-1ED8-468A-9FBF-B79809A8089A", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2201670-E611-4C1E-BD06-E2B4262C3687", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B0598FA-5EB7-41FF-AC46-BFBCE1EA1271", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C51F223-5529-4D10-A7AF-44198DE58684", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35C8C0CE-AA13-434D-83BD-2DA454B1937C", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5A8225E-A53A-4602-ACF6-F142D1CCF9FD", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF3486C1-EAD5-4861-8463-506D59A5F7DA", "versionEndExcluding": "comboam4v2_pi_1.2.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability." }, { "lang": "es", "value": "Un atacante malicioso en x86 puede configurar mal las regiones de memoria confiable (TMR), lo que puede permitirle establecer un rango de direcciones arbitrario para la TMR, lo que podr\u00eda provocar una p\u00e9rdida de integridad y disponibilidad." } ], "id": "CVE-2021-26367", "lastModified": "2024-12-12T20:41:56.120", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.2, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:17.360", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-13 16:30
Severity ?
2.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_software | * | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094", "versionEndExcluding": "23.12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0", "versionEndIncluding": "23.q4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service." }, { "lang": "es", "value": "La validaci\u00f3n inadecuada del \u00edndice de matriz en el firmware de administraci\u00f3n de energ\u00eda (PMFW) puede permitir que un atacante privilegiado provoque una lectura de memoria fuera de los l\u00edmites dentro de PMFW, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-31307", "lastModified": "2024-12-13T16:30:30.840", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 1.4, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:20.500", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-129" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-129" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:28
Severity ?
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_software | * | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", "matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094", "versionEndExcluding": "23.12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", "matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0", "versionEndIncluding": "23.q4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service." }, { "lang": "es", "value": "Una validaci\u00f3n de direcci\u00f3n DRAM insuficiente en PMFW puede permitir que un atacante privilegiado lea desde una direcci\u00f3n DRAM no v\u00e1lida a SRAM, lo que podr\u00eda provocar corrupci\u00f3n de datos o denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20510", "lastModified": "2024-12-12T20:28:55.010", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 4.2, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:18.777", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }