Vulnerabilites related to amd - radeon_software
cve-2020-12983
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-17 02:57
Severity ?
Summary
An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.208Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:17:05",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12983",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12983",
      datePublished: "2021-06-11T21:49:54.656844Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T02:57:33.983Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12987
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-17 01:02
Severity ?
Summary
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.199Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:17:38",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12987",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12987",
      datePublished: "2021-06-11T21:50:16.210991Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T01:02:07.506Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26363
Vulnerability from cvelistv5
Published
2022-05-12 18:39
Modified
2024-09-17 02:21
Severity ?
Summary
A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.
Impacted products
Vendor Product Version
AMD Ryzen™ Series Version: various
AMD Athlon™ Series Version: various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:26:24.452Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Ryzen™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               product: "Athlon™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2022-05-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "tbd",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-12T18:39:33",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
            },
         ],
         source: {
            advisory: "AMD-SB-1027",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2022-05-10T20:00:00.000Z",
               ID: "CVE-2021-26363",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Ryzen™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Athlon™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "tbd",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1027",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26363",
      datePublished: "2022-05-12T18:39:33.159439Z",
      dateReserved: "2021-01-29T00:00:00",
      dateUpdated: "2024-09-17T02:21:07.904Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12905
Vulnerability from cvelistv5
Published
2021-11-15 19:40
Modified
2024-09-17 00:36
Severity ?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.090Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T19:40:02",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12905",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12905",
      datePublished: "2021-11-15T19:40:02.588599Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T00:36:22.821Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-46748
Vulnerability from cvelistv5
Published
2023-11-14 18:50
Modified
2024-08-04 05:17
Severity ?
Summary
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T05:17:42.605Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               packageName: "AMD Software: Adrenalin Edition 23.7.1 ",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ RX 5000/6000/7000 Series Graphics Cards ",
               vendor: " AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AMD Software: PRO Edition 23.Q3 ",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ PRO W5000/W6000/W7000 Series Graphics Cards",
               vendor: " AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ RX Vega Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ PRO WX Vega Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n<br>",
                  },
               ],
               value: "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-14T18:50:52.470Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
            },
            {
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
            },
         ],
         source: {
            advisory: "AMD-SB-6003",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-46748",
      datePublished: "2023-11-14T18:50:52.470Z",
      dateReserved: "2022-03-31T16:50:27.865Z",
      dateUpdated: "2024-08-04T05:17:42.605Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12982
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-17 00:16
Severity ?
Summary
An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.962Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:16:44",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12982",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12982",
      datePublished: "2021-06-11T21:49:49.547155Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T00:16:16.729Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26362
Vulnerability from cvelistv5
Published
2022-05-12 17:43
Modified
2024-09-16 19:41
Severity ?
Summary
A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.
Impacted products
Vendor Product Version
AMD Ryzen™ Series Version: various
AMD Athlon™ Series Version: various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:26:24.904Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Ryzen™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               product: "Athlon™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2022-05-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "tbd",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-12T17:43:15",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
            },
         ],
         source: {
            advisory: "AMD-SB-1027",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2022-05-10T20:00:00.000Z",
               ID: "CVE-2021-26362",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Ryzen™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Athlon™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "tbd",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1027",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26362",
      datePublished: "2022-05-12T17:43:15.598731Z",
      dateReserved: "2021-01-29T00:00:00",
      dateUpdated: "2024-09-16T19:41:16.010Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-31320
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 14:53
Severity ?
Summary
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T14:53:30.757Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               packageName: "AMD Software: Adrenalin Edition 23.7.1 ",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ RX 5000/6000/7000 Series Graphics Cards ",
               vendor: " AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AMD Software: PRO Edition 23.Q3 ",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ PRO W5000/W6000/W7000 Series Graphics Cards",
               vendor: " AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ RX Vega Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ PRO WX Vega Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n<br>",
                  },
               ],
               value: "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-14T18:51:43.415Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
            },
         ],
         source: {
            advisory: "AMD-SB-6003",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-31320",
      datePublished: "2023-11-14T18:51:43.415Z",
      dateReserved: "2023-04-27T15:25:41.423Z",
      dateUpdated: "2024-08-02T14:53:30.757Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12892
Vulnerability from cvelistv5
Published
2021-11-15 18:39
Modified
2024-09-16 17:34
Severity ?
Summary
An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 21.3.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.033Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "21.3.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:14:38",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12892",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "21.3.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12892",
      datePublished: "2021-11-15T18:39:47.290631Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T17:34:18.633Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26391
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 17:33
Severity ?
Summary
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 5000 Series & PRO W5000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
AMD AMD Radeon RX 6000 Series & PRO W6000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:26:25.325Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon RX 5000 Series & PRO W5000 Series",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "22.5.2",
                     status: "affected",
                     version: "AMD Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.Q2",
                     status: "affected",
                     version: "AMD Radeon Pro Software Enterprise",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.10.20",
                     status: "affected",
                     version: "Enterprise Driver",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "AMD Radeon RX 6000 Series & PRO W6000 Series",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "22.5.2",
                     status: "affected",
                     version: "AMD Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.Q2",
                     status: "affected",
                     version: "AMD Radeon Pro Software Enterprise",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.10.20",
                     status: "affected",
                     version: "Enterprise Driver",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-11-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "TBD",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-09T00:00:00",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
            },
         ],
         source: {
            advisory: "AMD-SB-1029",
            discovery: "EXTERNAL",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26391",
      datePublished: "2022-11-09T20:44:25.253369Z",
      dateReserved: "2021-01-29T00:00:00",
      dateUpdated: "2024-09-16T17:33:16.199Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12930
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-17 00:00
Severity ?
Summary
Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 5000 Series & PRO W5000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
AMD AMD Ryzen(TM) Embedded R1000 Version: various
AMD AMD Ryzen(TM) Embedded R2000 Version: various
AMD AMD Ryzen(TM) Embedded 5000 Version: various
AMD AMD Ryzen(TM) Embedded V1000 Version: various
AMD AMD Ryzen(TM) Embedded V2000 Version: various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.208Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "AMD Radeon RX 5000 Series & PRO W5000 Series",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "22.5.2",
                     status: "affected",
                     version: "AMD Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.Q2",
                     status: "affected",
                     version: "AMD Radeon Pro Software Enterprise",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.10.20",
                     status: "affected",
                     version: "Enterprise Driver",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen(TM) Embedded R1000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen(TM) Embedded R2000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen(TM) Embedded 5000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen(TM) Embedded V1000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen(TM) Embedded V2000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2022-11-08T05:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.</p>",
                  },
               ],
               value: "Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-13T19:20:09.393Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
            },
            {
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
            },
         ],
         source: {
            advisory: "AMD-SB-1029, AMD-SB-5001",
            discovery: "EXTERNAL",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12930",
      datePublished: "2022-11-09T20:44:25.791003Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T00:00:30.267Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12986
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-16 16:58
Severity ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.187Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:17:26",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12986",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12986",
      datePublished: "2021-06-11T21:50:10.654582Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T16:58:08.554Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20586
Vulnerability from cvelistv5
Published
2023-08-08 17:05
Modified
2024-10-11 16:52
Severity ?
Summary
A potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations
Impacted products
Vendor Product Version
AMD Radeon™ Software Crimson ReLive Edition Version: Various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:36.256Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-20586",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-11T16:52:02.725525Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-11T16:52:31.173Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ Software Crimson ReLive Edition",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "Various ",
                  },
               ],
            },
         ],
         datePublic: "2023-08-08T16:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<span style=\"background-color: rgb(248, 249, 250);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">A potential vulnerability was reported in </span><span style=\"background-color: rgb(255, 255, 255);\">Radeon™ Software Crimson ReLive Edition</span><span style=\"background-color: rgb(255, 255, 255);\"> which may allow escalation of privilege. </span><span style=\"background-color: rgb(255, 255, 255);\">Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations</span>\n\n\n\n\n\n</span>\n\n\n\n\n\n\n\n\n\n",
                  },
               ],
               value: "\nA potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-08-08T17:05:16.338Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007",
            },
         ],
         source: {
            advisory: "AMD-SB-6007",
            discovery: "UNKNOWN",
         },
         title: "Radeon™ Software Crimson ReLive Edition",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-20586",
      datePublished: "2023-08-08T17:05:16.338Z",
      dateReserved: "2022-10-27T18:53:39.759Z",
      dateUpdated: "2024-10-11T16:52:31.173Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26360
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 22:56
Severity ?
Summary
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 6000 Series & PRO W6000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:26:25.015Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon RX 6000 Series & PRO W6000 Series",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "22.5.2",
                     status: "affected",
                     version: "AMD Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.Q2",
                     status: "affected",
                     version: "AMD Radeon Pro Software Enterprise",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.10.20",
                     status: "affected",
                     version: "Enterprise Driver",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-11-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "TBD",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-09T00:00:00",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
            },
         ],
         source: {
            advisory: "AMD-SB-1029",
            discovery: "EXTERNAL",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26360",
      datePublished: "2022-11-09T20:44:26.034287Z",
      dateReserved: "2021-01-29T00:00:00",
      dateUpdated: "2024-09-16T22:56:17.356Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12895
Vulnerability from cvelistv5
Published
2021-11-15 15:56
Modified
2024-09-16 22:02
Severity ?
Summary
Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.755Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:14:44",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12895",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12895",
      datePublished: "2021-11-15T15:56:00.755364Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T22:02:20.505Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26369
Vulnerability from cvelistv5
Published
2022-05-12 17:07
Modified
2024-09-16 19:51
Severity ?
Summary
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
Impacted products
Vendor Product Version
AMD Ryzen™ Series Version: various
AMD Athlon™ Series Version: various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:26:24.431Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Ryzen™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               product: "Athlon™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2022-05-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "tbd",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-12T17:07:32",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
            },
         ],
         source: {
            advisory: "AMD-SB-1027",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2022-05-10T20:00:00.000Z",
               ID: "CVE-2021-26369",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Ryzen™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Athlon™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "tbd",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1027",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26369",
      datePublished: "2022-05-12T17:07:32.274198Z",
      dateReserved: "2021-01-29T00:00:00",
      dateUpdated: "2024-09-16T19:51:13.979Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26367
Vulnerability from cvelistv5
Published
2024-08-13 16:50
Modified
2024-12-04 16:25
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2021-26367",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-13T18:04:31.680686Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        description: "CWE-noinfo Not enough information",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-04T16:25:09.987Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "ComboAM4v2 PI 1.2.0.5",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "ComboAM4PI  1.0.0.9",
                  },
                  {
                     status: "unaffected",
                     version: "ComboAM4v2 PI 1.2.0.8",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "ComboAM4v2 PI 1.2.0.5",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Athlon™ 3000 Series Mobile  Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "PicassoPI-FP5  1.0.0.E",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Athlon™ 3000 Series Mobile  Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "PollockPI-FT5  1.0.0.4",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "PicassoPI-FP5  1.0.0.E",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "RenoirPI-FP6  1.0.0.7",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "CezannePI-FP6 1.0.0.6",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "CezannePI-FP6 1.0.0.6",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "CezannePI-FP6 1.0.0.6",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "CezannePI-FP6 1.0.0.6",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "CezannePI-FP6 1.0.0.6",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Radeon™ RX 6000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "AMD Software:  Adrenalin Edition 23.12.1 (23.30.13.01)",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Radeon™ PRO W6000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "AMD Software:  PRO Edition 23.Q4 (23.30.13.03)",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ Embedded R1000 Series Processors",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "EmbeddedPI-FP5 1.2.0.A",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ Embedded R2000 Series Processors",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "EmbeddedR2KPI-FP5 1.0.0.2",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ Embedded V1000 Series Processors",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "EmbeddedPI-FP5 1.2.0.A",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Ryzen™ Embedded V2000 Series Processors",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "EmbeddedPI-FP6 1.0.0.6",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.",
                  },
               ],
               value: "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-08-13T16:50:05.825Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html",
            },
            {
               url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26367",
      datePublished: "2024-08-13T16:50:05.825Z",
      dateReserved: "2021-01-29T21:24:26.151Z",
      dateUpdated: "2024-12-04T16:25:09.987Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12894
Vulnerability from cvelistv5
Published
2021-11-15 19:48
Modified
2024-09-17 01:45
Severity ?
Summary
Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.130Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T19:48:37",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12894",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12894",
      datePublished: "2021-11-15T19:48:37.220384Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T01:45:55.094Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12899
Vulnerability from cvelistv5
Published
2021-11-15 15:29
Modified
2024-09-16 18:44
Severity ?
Summary
Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.946Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T15:29:56",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12899",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12899",
      datePublished: "2021-11-15T15:29:56.401647Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T18:44:07.969Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12962
Vulnerability from cvelistv5
Published
2021-11-15 19:42
Modified
2024-09-16 22:09
Severity ?
Summary
Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.192Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T19:42:43",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12962",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12962",
      datePublished: "2021-11-15T19:42:43.185696Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T22:09:11.342Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20510
Vulnerability from cvelistv5
Published
2024-08-13 16:52
Modified
2024-11-21 15:32
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "HIGH",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 4.7,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "NONE",
                     integrityImpact: "LOW",
                     privilegesRequired: "HIGH",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20510",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-13T18:03:49.594825Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        description: "CWE-noinfo Not enough information",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-21T15:32:34.695Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "AMD Radeon™ RX 6000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "AMD Software:  Adrenalin Edition 23.12.1 (23.30.13.01)",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Radeon™ PRO W6000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "AMD Software:  PRO Edition 23.Q4 (23.30.13.03)",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.",
                  },
               ],
               value: "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 4.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-08-13T16:52:11.777Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-20510",
      datePublished: "2024-08-13T16:52:11.777Z",
      dateReserved: "2022-10-27T18:53:39.735Z",
      dateUpdated: "2024-11-21T15:32:34.695Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26317
Vulnerability from cvelistv5
Published
2022-05-12 18:27
Modified
2024-09-17 01:10
Severity ?
Summary
Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.
Impacted products
Vendor Product Version
AMD Ryzen™ Series Version: various
AMD Athlon™ Series Version: various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:19:20.472Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Ryzen™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               product: "Athlon™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2022-05-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "tbd",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-12T18:27:48",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
            },
         ],
         source: {
            advisory: "AMD-SB-1027",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2022-05-10T20:00:00.000Z",
               ID: "CVE-2021-26317",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Ryzen™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Athlon™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "tbd",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1027",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26317",
      datePublished: "2022-05-12T18:27:48.589066Z",
      dateReserved: "2021-01-29T00:00:00",
      dateUpdated: "2024-09-17T01:10:36.785Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12900
Vulnerability from cvelistv5
Published
2021-11-15 15:27
Modified
2024-09-17 02:21
Severity ?
Summary
An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.394Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T15:27:51",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12900",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12900",
      datePublished: "2021-11-15T15:27:51.589901Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T02:21:18.348Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12904
Vulnerability from cvelistv5
Published
2021-11-15 15:12
Modified
2024-09-16 16:38
Severity ?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.111Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T15:12:44",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12904",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12904",
      datePublished: "2021-11-15T15:12:44.714023Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T16:38:11.800Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12960
Vulnerability from cvelistv5
Published
2021-11-15 19:47
Modified
2024-09-17 03:53
Severity ?
Summary
AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 21.4.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.103Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "21.4.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T19:47:19",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12960",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "21.4.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12960",
      datePublished: "2021-11-15T19:47:19.313108Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T03:53:03.583Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12985
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-16 17:23
Severity ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.044Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:16:33",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12985",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12985",
      datePublished: "2021-06-11T21:50:05.196288Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T17:23:19.728Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20598
Vulnerability from cvelistv5
Published
2023-10-17 13:26
Modified
2024-08-02 09:05
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "radeon_rx_5300_xt",
                  vendor: "amd",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "ryzen_5_7645hx",
                  vendor: "amd",
                  versions: [
                     {
                        lessThan: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "ryzen_9_pro_7945",
                  vendor: "amd",
                  versions: [
                     {
                        lessThan: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 7.8,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20598",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-27T17:12:05.139002Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-269",
                        description: "CWE-269 Improper Privilege Management",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-27T17:12:23.788Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:36.253Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ RX 5000 Series Graphics Cards",
               vendor: " AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ RX 6000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ RX 7000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ PRO W5000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "Various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ PRO W6000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ PRO W7000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Ryzen™ 7045 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: " Ryzen™ 7020 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Ryzen™ 7040 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Ryzen™ 7000 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Ryzen™ 6000 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Ryzen™ 7035 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n\n\n<span style=\"background-color: rgb(248, 249, 250);\">An improper privilege management in the AMD Radeon™</span>&nbsp;<span style=\"background-color: rgb(248, 249, 250);\">Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.</span>\n\n\n\n",
                  },
               ],
               value: "\n\n\nAn improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-10-17T13:26:21.731Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009",
            },
         ],
         source: {
            advisory: "  AMD-SB-6009",
            discovery: "EXTERNAL",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-20598",
      datePublished: "2023-10-17T13:26:21.731Z",
      dateReserved: "2022-10-27T18:53:39.763Z",
      dateUpdated: "2024-08-02T09:05:36.253Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26366
Vulnerability from cvelistv5
Published
2022-05-12 17:09
Modified
2024-09-17 01:51
Severity ?
Summary
An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.
Impacted products
Vendor Product Version
AMD Ryzen™ Series Version: various
AMD Athlon™ Series Version: various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:26:25.139Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Ryzen™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               product: "Athlon™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2022-05-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "tbd",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-12T17:09:29",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
            },
         ],
         source: {
            advisory: "AMD-SB-1027",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2022-05-10T20:00:00.000Z",
               ID: "CVE-2021-26366",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Ryzen™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Athlon™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "tbd",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1027",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26366",
      datePublished: "2022-05-12T17:09:29.825927Z",
      dateReserved: "2021-01-29T00:00:00",
      dateUpdated: "2024-09-17T01:51:13.541Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26392
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 20:51
Severity ?
Summary
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 5000 Series & PRO W5000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
AMD AMD Radeon RX 6000 Series & PRO W6000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
AMD AMD Ryzen™ Embedded R1000 Version: various
AMD AMD Ryzen™ Embedded R2000 Version: various
AMD AMD Ryzen™ Embedded 5000 Version: various
AMD AMD Ryzen™ Embedded V1000 Version: various
AMD AMD Ryzen™ Embedded V2000 Version: various
AMD AMD Ryzen™Embedded V3000 Version: various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:26:25.366Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "AMD Radeon RX 5000 Series & PRO W5000 Series",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "22.5.2",
                     status: "affected",
                     version: "AMD Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.Q2",
                     status: "affected",
                     version: "AMD Radeon Pro Software Enterprise",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.10.20",
                     status: "affected",
                     version: "Enterprise Driver",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Radeon RX 6000 Series & PRO W6000 Series",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "22.5.2",
                     status: "affected",
                     version: "AMD Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.Q2",
                     status: "affected",
                     version: "AMD Radeon Pro Software Enterprise",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.10.20",
                     status: "affected",
                     version: "Enterprise Driver",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ Embedded R1000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ Embedded R2000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ Embedded 5000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ Embedded V1000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ Embedded V2000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™Embedded V3000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2022-11-08T05:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.</p>",
                  },
               ],
               value: "Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-13T19:22:08.137Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
            },
            {
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
            },
         ],
         source: {
            advisory: "AMD-SB-1029, AMD-SB-5001",
            discovery: "EXTERNAL",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26392",
      datePublished: "2022-11-09T20:44:26.258839Z",
      dateReserved: "2021-01-29T00:00:00",
      dateUpdated: "2024-09-16T20:51:46.791Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26361
Vulnerability from cvelistv5
Published
2022-05-12 17:46
Modified
2024-09-17 01:06
Severity ?
Summary
A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.
Impacted products
Vendor Product Version
AMD Ryzen™ Series Version: various
AMD Athlon™ Series Version: various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:26:24.531Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Ryzen™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               product: "Athlon™ Series",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2022-05-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "tbd",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-12T17:46:01",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
            },
         ],
         source: {
            advisory: "AMD-SB-1027",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2022-05-10T20:00:00.000Z",
               ID: "CVE-2021-26361",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Ryzen™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Athlon™ Series",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "various",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "tbd",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1027",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26361",
      datePublished: "2022-05-12T17:46:01.990877Z",
      dateReserved: "2021-01-29T00:00:00",
      dateUpdated: "2024-09-17T01:06:56.408Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26393
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 21:58
Severity ?
Summary
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 5000 Series & PRO W5000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
AMD AMD Radeon RX 6000 Series & PRO W6000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
AMD AMD Ryzen™ Embedded R1000 Version: various
AMD AMD Ryzen™ Embedded R2000 Version: various
AMD AMD Ryzen™ Embedded V1000 Version: various
AMD AMD Ryzen™ Embedded V2000 Version: various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:26:25.406Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "AMD Radeon RX 5000 Series & PRO W5000 Series",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "22.5.2",
                     status: "affected",
                     version: "AMD Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.Q2",
                     status: "affected",
                     version: "AMD Radeon Pro Software Enterprise",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.10.20",
                     status: "affected",
                     version: "Enterprise Driver",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Radeon RX 6000 Series & PRO W6000 Series",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "22.5.2",
                     status: "affected",
                     version: "AMD Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.Q2",
                     status: "affected",
                     version: "AMD Radeon Pro Software Enterprise",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.10.20",
                     status: "affected",
                     version: "Enterprise Driver",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ Embedded R1000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ Embedded R2000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ Embedded V1000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen™ Embedded V2000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2022-11-08T05:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.</p>",
                  },
               ],
               value: "Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-13T19:22:50.269Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
            },
            {
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
            },
         ],
         source: {
            advisory: "AMD-SB-1029, AMD-SB-5001",
            discovery: "EXTERNAL",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-26393",
      datePublished: "2022-11-09T20:44:25.517806Z",
      dateReserved: "2021-01-29T00:00:00",
      dateUpdated: "2024-09-16T21:58:26.137Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12903
Vulnerability from cvelistv5
Published
2021-11-15 19:44
Modified
2024-09-17 00:52
Severity ?
Summary
Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.704Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T19:44:12",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12903",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12903",
      datePublished: "2021-11-15T19:44:12.722388Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T00:52:24.174Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20567
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 09:05
Severity ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:36.949Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               packageName: "AMD Software: Adrenalin Edition 23.7.1 ",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ RX 5000/6000/7000 Series Graphics Cards ",
               vendor: " AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AMD Software: PRO Edition 23.Q3 ",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ PRO W5000/W6000/W7000 Series Graphics Cards",
               vendor: " AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ RX Vega Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ PRO WX Vega Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n<br>",
                  },
               ],
               value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-14T18:51:25.340Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
            },
            {
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
            },
         ],
         source: {
            advisory: "AMD-SB-6003",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-20567",
      datePublished: "2023-11-14T18:51:25.340Z",
      dateReserved: "2022-10-27T18:53:39.753Z",
      dateUpdated: "2024-08-02T09:05:36.949Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-20568
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 09:05
Severity ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:36.255Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               packageName: "AMD Software: Adrenalin Edition 23.7.1 ",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ RX 5000/6000/7000 Series Graphics Cards ",
               vendor: " AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AMD Software: PRO Edition 23.Q3 ",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ PRO W5000/W6000/W7000 Series Graphics Cards",
               vendor: " AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ RX Vega Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               platforms: [
                  "x86",
               ],
               product: "Radeon™ PRO WX Vega Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
         ],
         datePublic: "2023-11-14T17:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n<br>",
                  },
               ],
               value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-14T18:51:35.466Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
            },
            {
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
            },
         ],
         source: {
            advisory: "AMD-SB-6003",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-20568",
      datePublished: "2023-11-14T18:51:35.466Z",
      dateReserved: "2022-10-27T18:53:39.754Z",
      dateUpdated: "2024-08-02T09:05:36.255Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12931
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-17 00:56
Severity ?
Summary
Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 5000 Series & PRO W5000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
AMD AMD Ryzen(TM) Embedded R1000 Version: various
AMD AMD Ryzen(TM) Embedded R2000 Version: various
AMD AMD Ryzen(TM) Embedded 5000 Version: various
AMD AMD Ryzen(TM) Embedded V1000 Version: various
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.233Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "AMD Radeon RX 5000 Series & PRO W5000 Series",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "22.5.2",
                     status: "affected",
                     version: "AMD Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.Q2",
                     status: "affected",
                     version: "AMD Radeon Pro Software Enterprise",
                     versionType: "custom",
                  },
                  {
                     lessThan: "22.10.20",
                     status: "affected",
                     version: "Enterprise Driver",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen(TM) Embedded R1000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen(TM) Embedded R2000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen(TM) Embedded 5000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Ryzen(TM) Embedded V1000",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
         ],
         datePublic: "2022-11-08T05:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.</p>",
                  },
               ],
               value: "Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-13T19:20:36.423Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
            },
            {
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
            },
         ],
         source: {
            advisory: "AMD-SB-1029, AMD-SB-5001",
            discovery: "EXTERNAL",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12931",
      datePublished: "2022-11-09T20:44:24.974055Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T00:56:08.624Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21937
Vulnerability from cvelistv5
Published
2024-11-12 17:14
Modified
2024-11-14 16:26
Summary
Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Impacted products
Vendor Product Version
AMD AMD Software: PRO Edition Version: 0
Version: 0
AMD AMD Software: Adrenalin Edition Version: 0
AMD AMD Software: Cloud Edition Version: 0
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:amd:amd_software_pro_edition:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "amd_software_pro_edition",
                  vendor: "amd",
                  versions: [
                     {
                        lessThan: "24.10.16",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "24.q2_24.10.20",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:amd:amd_software_adrenalin_edition:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "amd_software_adrenalin_edition",
                  vendor: "amd",
                  versions: [
                     {
                        lessThan: "24.6.1_24.10.21.01",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:amd:amd_software_cloud_edition:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "amd_software_cloud_edition",
                  vendor: "amd",
                  versions: [
                     {
                        lessThan: "24.7.1",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21937",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-14T16:22:23.757990Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-14T16:26:04.560Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               platforms: [
                  "Windows",
               ],
               product: "AMD Software: PRO Edition",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "24.10.16",
                     status: "affected",
                     version: "0",
                     versionType: "software",
                  },
                  {
                     lessThan: "24.Q2 (24.10.20)",
                     status: "affected",
                     version: "0",
                     versionType: "software",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Software: Adrenalin Edition",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "24.6.1 (24.10.21.01)",
                     status: "affected",
                     version: "0",
                     versionType: "software",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "AMD Software: Cloud Edition",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "24.7.1",
                     status: "affected",
                     version: "0",
                     versionType: "software",
                  },
               ],
            },
         ],
         datePublic: "2024-11-12T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<span style=\"background-color: rgb(248, 249, 250);\">Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.</span>",
                  },
               ],
               value: "Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-276",
                     description: "CWE-276 Incorrect Default Permissions",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-11-12T17:14:20.641Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6015.html",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2024-21937",
      datePublished: "2024-11-12T17:14:20.641Z",
      dateReserved: "2024-01-03T16:43:14.977Z",
      dateUpdated: "2024-11-14T16:26:04.560Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12897
Vulnerability from cvelistv5
Published
2021-11-15 15:44
Modified
2024-09-16 17:38
Severity ?
Summary
Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 21.3.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.036Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "21.3.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T15:44:11",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12897",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "21.3.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12897",
      datePublished: "2021-11-15T15:44:11.456371Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T17:38:45.112Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-31307
Vulnerability from cvelistv5
Published
2024-08-13 16:54
Modified
2024-12-03 16:30
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-31307",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-13T18:03:11.598841Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-129",
                        description: "CWE-129 Improper Validation of Array Index",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-12-03T16:30:08.173Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "AMD Radeon™ RX 6000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "AMD Software:  Adrenalin Edition 23.12.1 (23.30.13.01)",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "AMD Radeon™ PRO W6000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "unaffected",
                     version: "AMD Software:  PRO Edition 23.Q4 (23.30.13.03)",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "&nbsp; &nbsp;Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.",
                  },
               ],
               value: "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "LOW",
                  baseScore: 2.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-08-13T16:54:03.514Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-31307",
      datePublished: "2024-08-13T16:54:03.514Z",
      dateReserved: "2023-04-27T15:25:41.422Z",
      dateUpdated: "2024-12-03T16:30:08.173Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12981
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-16 18:19
Severity ?
Summary
An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.107Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:16:55",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12981",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12981",
      datePublished: "2021-06-11T21:49:43.864896Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T18:19:38.577Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12920
Vulnerability from cvelistv5
Published
2021-11-15 15:50
Modified
2024-09-16 18:49
Severity ?
Summary
A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.124Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T15:50:34",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12920",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12920",
      datePublished: "2021-11-15T15:50:34.930613Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T18:49:42.624Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12898
Vulnerability from cvelistv5
Published
2021-11-15 18:58
Modified
2024-09-17 03:03
Severity ?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.206Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T18:58:30",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12898",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12898",
      datePublished: "2021-11-15T18:58:30.225747Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T03:03:38.846Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12929
Vulnerability from cvelistv5
Published
2021-11-15 15:52
Modified
2024-09-17 02:00
Severity ?
Summary
Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.216Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:14:51",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12929",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12929",
      datePublished: "2021-11-15T15:52:18.454932Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T02:00:49.330Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12902
Vulnerability from cvelistv5
Published
2021-11-15 15:48
Modified
2024-09-16 16:59
Severity ?
Summary
Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.204Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T15:48:41",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12902",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12902",
      datePublished: "2021-11-15T15:48:41.148192Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T16:59:09.552Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12891
Vulnerability from cvelistv5
Published
2022-02-04 22:29
Modified
2024-09-16 17:33
Severity ?
Summary
AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.
Impacted products
Vendor Product Version
AMD Radeon Software Version: Radeon Driver   < 21.4.1
AMD Radeon Pro Software for Enterprise Version: Enterprise Driver   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.664Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "21.4.1",
                     status: "affected",
                     version: "Radeon Driver",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Radeon Pro Software for Enterprise",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Enterprise Driver",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "TBD",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-04T22:29:12",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:30:00.000Z",
               ID: "CVE-2020-12891",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Driver",
                                          version_value: "21.4.1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Radeon Pro Software for Enterprise",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Enterprise Driver",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "TBD",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12891",
      datePublished: "2022-02-04T22:29:12.020774Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T17:33:32.143Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12963
Vulnerability from cvelistv5
Published
2021-11-15 15:58
Modified
2024-09-16 22:45
Severity ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.216Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:14:56",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12963",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12963",
      datePublished: "2021-11-15T15:58:06.272723Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T22:45:17.132Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12893
Vulnerability from cvelistv5
Published
2021-11-15 19:45
Modified
2024-09-16 23:15
Severity ?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.856Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:14:45",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12893",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12893",
      datePublished: "2021-11-15T19:45:36.942420Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T23:15:51.176Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12901
Vulnerability from cvelistv5
Published
2021-11-15 19:20
Modified
2024-09-17 03:17
Severity ?
Summary
Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.064Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.11.2",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-15T19:20:07",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12901",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.11.2",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12901",
      datePublished: "2021-11-15T19:20:07.896631Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T03:17:36.985Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12980
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-17 03:22
Severity ?
Summary
An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:19.003Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:17:16",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12980",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12980",
      datePublished: "2021-06-11T21:49:38.162263Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-17T03:22:33.667Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-12964
Vulnerability from cvelistv5
Published
2021-11-15 14:51
Modified
2024-09-16 18:28
Severity ?
Summary
A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:11:18.701Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "AMD Radeon Software",
               vendor: "AMD",
               versions: [
                  {
                     lessThan: "20.7.1",
                     status: "affected",
                     version: "Radeon Software",
                     versionType: "custom",
                  },
                  {
                     lessThan: "21.Q2",
                     status: "affected",
                     version: "Radeon Pro Software for Enterprise",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "NA",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-27T18:14:55",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
            },
         ],
         source: {
            advisory: "AMD-SB-1000",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@amd.com",
               DATE_PUBLIC: "2021-11-09T20:00:00.000Z",
               ID: "CVE-2020-12964",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "AMD Radeon Software",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Software",
                                          version_value: "20.7.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_name: "Radeon Pro Software for Enterprise",
                                          version_value: "21.Q2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "AMD",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "NA",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                     refsource: "MISC",
                     url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
                  },
               ],
            },
            source: {
               advisory: "AMD-SB-1000",
               discovery: "UNKNOWN",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2020-12964",
      datePublished: "2021-11-15T14:51:15.631262Z",
      dateReserved: "2020-05-15T00:00:00",
      dateUpdated: "2024-09-16T18:28:27.531Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2023-08-08 18:15
Modified
2024-11-21 07:41
Severity ?
Summary
A potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations
Impacted products
Vendor Product Version
amd radeon_software -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:crimson_relive:*:*:*",
                     matchCriteriaId: "1B9B57CB-1D5E-4FE9-B03D-315A9B54650A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "\nA potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
      },
   ],
   id: "CVE-2023-20586",
   lastModified: "2024-11-21T07:41:10.223",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-08-08T18:15:11.593",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Summary
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
Impacted products
Vendor Product Version
amd enterprise_driver *
amd radeon_pro_software *
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd ryzen_3_2200ge_firmware -
amd ryzen_3_2200ge -
amd ryzen_3_2200g_firmware -
amd ryzen_3_2200g -
amd ryzen_5_2400ge_firmware -
amd ryzen_5_2400ge -
amd ryzen_5_2400g_firmware -
amd ryzen_5_2400g -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_5_3500_firmware -
amd ryzen_5_3500 -
amd ryzen_5_3500x_firmware -
amd ryzen_5_3500x -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_9_3900_firmware -
amd ryzen_9_3900 -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3900xt_firmware -
amd ryzen_9_3900xt -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_5_5500_firmware -
amd ryzen_5_5500 -
amd ryzen_5_5600_firmware -
amd ryzen_5_5600 -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_7_5700x_firmware -
amd ryzen_7_5700x -
amd ryzen_7_5800x_firmware -
amd ryzen_7_5800x -
amd ryzen_7_5800_firmware -
amd ryzen_7_5800 -
amd ryzen_7_5800x3d_firmware -
amd ryzen_7_5800x3d -
amd ryzen_9_5900_firmware -
amd ryzen_9_5900 -
amd ryzen_9_5900x_firmware -
amd ryzen_9_5900x -
amd ryzen_9_5950x_firmware -
amd ryzen_9_5950x -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -
amd athlon_silver_3050e_firmware -
amd athlon_silver_3050e -
amd athlon_pro_3045b_firmware -
amd athlon_pro_3045b -
amd athlon_silver_3050u_firmware -
amd athlon_silver_3050u -
amd athlon_silver_3050c_firmware -
amd athlon_silver_3050c -
amd athlon_pro_3145b_firmware -
amd athlon_pro_3145b -
amd athlon_gold_3150u_firmware -
amd athlon_gold_3150u -
amd athlon_gold_3150c_firmware -
amd athlon_gold_3150c -
amd ryzen_3_3250u_firmware -
amd ryzen_3_3250u -
amd ryzen_3_3250c_firmware -
amd ryzen_3_3250c -
amd amd_3020e_firmware -
amd amd_3020e -
amd amd_3015e_firmware -
amd amd_3015e -
amd amd_3015ce_firmware -
amd amd_3015ce -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_3_3300u_firmware -
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware -
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware -
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware -
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware -
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware -
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware -
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware -
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware -
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware -
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware -
amd ryzen_7_3780u -
amd ryzen_3_pro_3200ge_firmware -
amd ryzen_3_pro_3200ge -
amd ryzen_3_3200g_firmware -
amd ryzen_3_3200g -
amd ryzen_3_pro_3200g_firmware -
amd ryzen_3_pro_3200g -
amd ryzen_5_pro_3350ge_firmware -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3350g_firmware -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3400ge_firmware -
amd ryzen_5_pro_3400ge -
amd ryzen_5_pro_3400g_firmware -
amd ryzen_5_pro_3400g -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
                     versionEndExcluding: "22.10.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
                     versionEndExcluding: "22.q2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
                     versionEndExcluding: "22.5.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3C57977-E2BA-494F-AA3C-B460117B2996",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0D0E24-0615-4F6C-947D-CFA59D114486",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "41C3746E-6D5F-47B5-BE13-1A6DC004F79B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B682A8FF-B83F-41A5-BA22-4394EC0C4457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B38ABACD-4E5D-440C-9464-C894DB610C94",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B230F1D4-FF59-43E5-BC20-0BCD43A55683",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2503E43D-8415-4702-B7AA-22C472F4BE51",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09ADB589-F43C-43A5-8CA6-B9D4D3294880",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F0E87F5-65BA-477D-9679-907FD2906298",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A56423-3DDE-451B-AC47-51715AC74F41",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927B2661-8988-484F-965C-D94AA9D52911",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D814C2A-D794-46A8-9A06-CC4DB387176F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4350ADE3-9A31-4A23-9B15-7A44E8F29E90",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E52108F-FAAE-4075-8F87-239008E77009",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E309B1D5-E232-4F26-BF35-25A1542A5E10",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E68C36-118D-41F9-900E-9F38F585A34D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E654C546-AAEE-4DDA-81B4-144DD5766F9F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "487D6661-ECA7-44C0-BD46-FC8C03187B85",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "777D94BA-613B-49E9-B1B3-2A9E0FC35908",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34045719-7683-4621-929B-5F6B16B6A580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "331E829F-D05A-4D6D-A017-A2BE0D7C3D09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EE2DD3E-51C4-4E21-BC43-CE567812B59A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54611A05-BCA3-495A-8CDB-946FF47E0333",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CC4654E-519B-4412-B551-F2436108152B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "951CA892-BAE2-46A4-BC86-0A205A4FA218",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6882B4E1-0BFF-4093-BE67-72294949C3F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CFF28BE-F049-4716-AADE-643FABB753A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E741A31-8265-45E0-9834-23D00D5F8176",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "610909ED-A636-4007-A50F-500057340E70",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E11A9D-03EC-4014-BB1C-5286C694581B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0C29793-1142-4506-8C32-3B89227BB3A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "913A2DC9-4215-486B-BD15-3AF515E3CDCC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DF8A936-58AE-44BB-897E-44782232394F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FC3889-3F62-48AC-876D-5A630A5E2AD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D79E460A-D34C-4120-8529-F32988793DC6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "069392FC-51DB-49F0-B30B-8ED46C694057",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9921AE2D-F497-47C8-B463-947E230CF4F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2452A625-5B59-49DF-A3C3-872642181E9D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51D4403E-C626-4817-B0C9-ECEC420C517D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533144EB-802F-496D-8C09-15AEA537F89B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFDD574D-1799-4386-A906-705DC2F0978F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58EE3F9B-6950-4F83-B0BE-ADA560457BC1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B16B55B-11B3-43DB-860A-62CD3020B536",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8C6F103-30CC-4738-B489-B12790836B1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE2EC993-8A65-416B-939F-1C707D596AF9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0359E9DA-5BC0-48FD-962C-34358691E7DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "945182A3-1BE3-459D-BC45-5554FB905C3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "228E3FBD-F997-402D-AE96-B14D66390700",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF105508-6252-4101-92B5-ECA9022D4720",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "926812AD-94F0-4CB8-9890-EAB11FDC1804",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9724784-3A56-4175-9829-796CF687CA09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40933267-3CEF-417E-BE95-37B562F37E78",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.",
      },
      {
         lang: "es",
         value: "Una verificación insuficiente del tamaño faltante en 'LoadModule' puede provocar una escritura fuera de límites que podría permitir que un atacante con privilegios obtenga la ejecución de código del sistema operativo/kernel cargando un TA malicioso.",
      },
   ],
   id: "CVE-2021-26392",
   lastModified: "2024-11-21T05:56:16.773",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-09T21:15:12.360",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-10-17 14:15
Modified
2024-11-21 07:41
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
Impacted products
Vendor Product Version
amd radeon_software *
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_gre_10gb -
amd radeon_rx_6750_gre_12gb -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800s -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_7600 -
amd radeon_rx_7600m -
amd radeon_rx_7600m_xt -
amd radeon_rx_7600s -
amd radeon_rx_7700_xt -
amd radeon_rx_7700s -
amd radeon_rx_7800_xt -
amd radeon_rx_7900_gre -
amd radeon_rx_7900_xt -
amd radeon_rx_7900_xtx -
amd radeon_rx_7900m -
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5700 -
amd radeon_pro_w6300 -
amd radeon_pro_w6400 -
amd radeon_pro_w6600 -
amd radeon_pro_w6800 -
amd radeon_pro_w7500 -
amd radeon_pro_w7600 -
amd radeon_pro_w7800 -
amd radeon_pro_w7900 -
amd radeon_software *
amd radeon_software *
amd ryzen_3_7320u -
amd ryzen_3_7335u -
amd ryzen_3_7440u -
amd ryzen_5_6600h -
amd ryzen_5_6600hs -
amd ryzen_5_6600u -
amd ryzen_5_7500f -
amd ryzen_5_7520u -
amd ryzen_5_7535hs -
amd ryzen_5_7535u -
amd ryzen_5_7540u -
amd ryzen_5_7600 -
amd ryzen_5_7600x -
amd ryzen_5_7640h -
amd ryzen_5_7640u -
amd ryzen_5_7645hx -
amd ryzen_5_pro_7640hs -
amd ryzen_5_pro_7645 -
amd ryzen_7_6800h -
amd ryzen_7_6800hs -
amd ryzen_7_6800u -
amd ryzen_7_7700 -
amd ryzen_7_7700x -
amd ryzen_7_7735hs -
amd ryzen_7_7735u -
amd ryzen_7_7736u -
amd ryzen_7_7745hx -
amd ryzen_7_7800x3d -
amd ryzen_7_7840h -
amd ryzen_7_7840u -
amd ryzen_7_pro_7745 -
amd ryzen_7_pro_7840hs -
amd ryzen_9_6900hs -
amd ryzen_9_6900hx -
amd ryzen_9_6980hs -
amd ryzen_9_6980hx -
amd ryzen_9_7845hx -
amd ryzen_9_7900 -
amd ryzen_9_7900x -
amd ryzen_9_7900x3d -
amd ryzen_9_7940h -
amd ryzen_9_7945hx -
amd ryzen_9_7945hx3d -
amd ryzen_9_7950x -
amd ryzen_9_7950x3d -
amd ryzen_9_pro_7940hs -
amd ryzen_9_pro_7945 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "7162DB91-6B5C-4575-A8D0-B83B34908BE5",
                     versionEndExcluding: "23.9.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BB37AAC-3957-4840-B47E-ED678F0B6044",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA1DA067-DE94-4663-91CD-A70CC386D45A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "2841E9B4-728C-4201-AAF1-3250A1DC08F3",
                     versionEndExcluding: "23.q4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF5CD86-64D3-4F02-9971-AC50E8052986",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "7162DB91-6B5C-4575-A8D0-B83B34908BE5",
                     versionEndExcluding: "23.9.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "2841E9B4-728C-4201-AAF1-3250A1DC08F3",
                     versionEndExcluding: "23.q4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48F04B9F-8C65-476B-B5D8-18CC96E3B712",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "495E436C-B0EE-4B72-AB49-332F4752C140",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C4FDE72-050C-4A72-A4F4-9C1D5273CADD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D260012-5D8F-4B36-8B88-82DB0291EE9D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "025E494E-953E-426E-BE89-6F2360A3AAC4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1232B034-1214-4F9A-823D-DC76D5C5956B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0870FBE4-92B4-4717-88B0-EC1094268034",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE36D471-57BF-4385-A825-029F7313E4DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "082BE536-F29C-4A73-B030-A19DD3A448B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6740A06F-4512-427D-9CB9-A4A6DB046BA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C05D51F-469D-487D-9FC8-E1AD699A6F74",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BC5E111-A7AA-4A45-A2E3-47013F9135D4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB5D5B25-F32A-493E-BD54-57098981E15A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E3657C6-1047-4CA9-8D44-C7143F7D877D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2787C72-42D5-42B0-BE5B-E548B319BCF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09B085FF-EAEA-42BC-BA60-3AA9B76141B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "760F20CC-9034-462C-A25E-C009E2218C38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D2CBCEA-AB4F-444C-9CCD-A976003F796C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76121981-8DC2-4779-833E-4B15CFCF7FC3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "225E8405-04FF-4885-92C8-8581ACC66E06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D50E8EA-ECB2-463D-BA51-D13CF5A02266",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69289284-2ED2-4D8B-8AE2-B835AAF31EAD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA6CD984-A8C7-4B23-8FF9-896C503EBA37",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2D0429F-F186-4F78-9AE0-574E3A39926D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8480A7E0-882C-4B03-ADBC-697304B0B7C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B21FB338-F944-40F9-8F0C-99B471AAD51E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3674D656-9623-4B39-AADE-158FE70FF29F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD27234D-ACFC-4144-8980-2B706822C579",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5602B902-9FDB-4946-BE4C-236262285F2F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA666DF3-C5F3-4127-A8EE-B784DD41F642",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86CAA682-9666-4929-B1AC-D9DB3109DB1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A7E6806-A7AC-4C96-960B-B8934CEA2439",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74DD4A40-B712-4B54-9CC7-0BFD79E917BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82CCEE11-392D-4486-A6AD-CB64FB8B7081",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F05C8669-6348-4A1B-B1D4-D22022E1F67E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "018A02C9-2A5C-43E2-8CCD-4D03C119C22B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3DE32CA-168F-4812-AEAE-D771EB01E15D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "\n\n\nAn improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n",
      },
      {
         lang: "es",
         value: "Una gestión de privilegios inadecuada en el controlador de gráficos AMD Radeon™ puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones físicas arbitrarias, lo que resulta en una posible ejecución de código arbitrario.",
      },
   ],
   id: "CVE-2023-20598",
   lastModified: "2024-11-21T07:41:12.177",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-10-17T14:15:09.813",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-269",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.
Impacted products
Vendor Product Version
amd radeon_software *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.",
      },
      {
         lang: "es",
         value: "Se presenta un problema potencial de denegación de servicio en AMD Display driver Escape 0x130007 Call handler. Un atacante con bajo privilegio podría inducir potencialmente un BugCheck de Windows",
      },
   ],
   id: "CVE-2020-12920",
   lastModified: "2024-11-21T05:00:32.737",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T16:15:09.380",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 08:01
Summary
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_7600 -
amd radeon_rx_7600m -
amd radeon_rx_7600m_xt -
amd radeon_rx_7600s -
amd radeon_rx_7700_xt -
amd radeon_rx_7700s -
amd radeon_rx_7800_xt -
amd radeon_rx_7900_gre -
amd radeon_rx_7900_xt -
amd radeon_rx_7900_xtx -
amd radeon_rx_7900m -
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300 -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_pro_w7500 -
amd radeon_pro_w7600 -
amd radeon_pro_w7800 -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd radeon_pro_vega_56_firmware -
amd radeon_pro_vega_56 -
amd radeon_pro_vega_64_firmware -
amd radeon_pro_vega_64 -
amd radeon_software *
amd radeon_software *
amd ryzen_3_3015ce -
amd ryzen_3_3015e -
amd ryzen_3_4100 -
amd ryzen_3_4300g -
amd ryzen_3_4300ge -
amd ryzen_3_4300u -
amd ryzen_3_5300g -
amd ryzen_3_5300ge -
amd ryzen_3_5300u -
amd ryzen_5_4500 -
amd ryzen_5_4500u -
amd ryzen_5_4600g -
amd ryzen_5_4600ge -
amd ryzen_5_4600h -
amd ryzen_5_4600hs -
amd ryzen_5_4600u -
amd ryzen_5_4680u -
amd ryzen_5_5500h -
amd ryzen_5_5500u -
amd ryzen_5_5600g -
amd ryzen_5_5600ge -
amd ryzen_5_pro_3200g -
amd ryzen_5_pro_3200ge -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3400g -
amd ryzen_5_pro_3400ge -
amd ryzen_7_4700g -
amd ryzen_7_4700ge -
amd ryzen_7_4700u -
amd ryzen_7_4800h -
amd ryzen_7_4800hs -
amd ryzen_7_4980u -
amd ryzen_7_5700g -
amd ryzen_7_5700ge -
amd ryzen_7_5700u -
amd ryzen_9_4900h -
amd ryzen_9_4900hs -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135",
                     versionEndExcluding: "23.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467",
                     versionEndExcluding: "23.q3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52880029-7A09-47F5-84B9-7A8A77D883F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40A38A14-D45C-4746-BCDC-D26D178B1426",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D89E1B8-509D-428E-984C-E23D808A0006",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135",
                     versionEndExcluding: "23.7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467",
                     versionEndExcluding: "23.q3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7774C021-B18A-473A-90B5-48A95071E5BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "263E53BD-7A57-40AC-8A35-D761BD3895A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E02A9C95-DF12-4816-88C3-6AFC331B8426",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDA92163-5A72-4271-89D4-401C24950F62",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "510FB098-A28C-46AD-9244-438DC828A007",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "954500F1-6466-4A1C-8E0C-D759121CEBDC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A4079E-01E9-4807-A293-F6E843752554",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D111819-345A-4BAF-83D0-1153209AFCEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D70D28B-809E-456C-96ED-84A4CA7EC942",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C5F418C-2989-44C0-A880-A7BBA067E581",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n",
      },
      {
         lang: "es",
         value: "Una validación de entrada incorrecta en el controlador de pantalla AMD RadeonTM Graphics puede permitir que un atacante dañe la pantalla, lo que podría provocar una denegación de servicio.",
      },
   ],
   id: "CVE-2023-31320",
   lastModified: "2024-11-21T08:01:46.340",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T19:15:25.070",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de comprobación de punteros insuficiente en AMD Graphics Driver para Windows puede permitir a usuarios no privilegiados comprometer el sistema",
      },
   ],
   id: "CVE-2020-12963",
   lastModified: "2024-11-21T05:00:35.597",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T16:15:09.480",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-763",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 15:15
Modified
2024-11-21 05:00
Summary
A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.
Impacted products
Vendor Product Version
amd radeon_software *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.",
      },
      {
         lang: "es",
         value: "Se presenta un problema potencial de escalada de privilegios/denegación de servicio en AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. Un atacante poco privilegiado podría inducir potencialmente un BugCheck de Windows o escribir para filtrar información",
      },
   ],
   id: "CVE-2020-12964",
   lastModified: "2024-11-21T05:00:35.713",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T15:15:06.687",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
                     versionEndExcluding: "21.q1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de comprobación de puntero insuficiente en el controlador de gráficos AMD para Windows 10 puede conllevar a una escalada de privilegios o denegación de servicio",
      },
   ],
   id: "CVE-2020-12985",
   lastModified: "2024-11-21T05:00:37.010",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-11T22:15:11.507",
   references: [
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.",
      },
      {
         lang: "es",
         value: "Un Desbordamiento del Búfer de la Pila en AMD Graphics Driver para Windows 10 en Escape 0x15002a puede conllevar a una escalada de privilegios o una denegación de servicio",
      },
   ],
   id: "CVE-2020-12893",
   lastModified: "2024-11-21T05:00:30.680",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T20:15:19.467",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
Impacted products
Vendor Product Version
intel radeon_rx_vega_m_firmware *
intel core_i5-8305g -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel nuc_8_enthusiast_nuc8i7hnkqc -
intel nuc_8_enthusiast_nuc8i7hvkva -
intel nuc_8_enthusiast_nuc8i7hvkvaw -
intel nuc_kit_nuc8i7hnk -
intel nuc_kit_nuc8i7hvk -
amd radeon_software *
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_7600 -
amd radeon_rx_7600m -
amd radeon_rx_7600m_xt -
amd radeon_rx_7600s -
amd radeon_rx_7700_xt -
amd radeon_rx_7700s -
amd radeon_rx_7800_xt -
amd radeon_rx_7900_gre -
amd radeon_rx_7900_xt -
amd radeon_rx_7900_xtx -
amd radeon_rx_7900m -
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300 -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_pro_w7500 -
amd radeon_pro_w7600 -
amd radeon_pro_w7800 -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd radeon_pro_vega_56_firmware -
amd radeon_pro_vega_56 -
amd radeon_pro_vega_64_firmware -
amd radeon_pro_vega_64 -
amd radeon_software *
amd radeon_software *
amd ryzen_3_3015ce -
amd ryzen_3_3015e -
amd ryzen_3_4100 -
amd ryzen_3_4300g -
amd ryzen_3_4300ge -
amd ryzen_3_4300u -
amd ryzen_3_5300g -
amd ryzen_3_5300ge -
amd ryzen_3_5300u -
amd ryzen_5_4500 -
amd ryzen_5_4500u -
amd ryzen_5_4600g -
amd ryzen_5_4600ge -
amd ryzen_5_4600h -
amd ryzen_5_4600hs -
amd ryzen_5_4600u -
amd ryzen_5_4680u -
amd ryzen_5_5500h -
amd ryzen_5_5500u -
amd ryzen_5_5600g -
amd ryzen_5_5600ge -
amd ryzen_5_pro_3200g -
amd ryzen_5_pro_3200ge -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3400g -
amd ryzen_5_pro_3400ge -
amd ryzen_7_4700g -
amd ryzen_7_4700ge -
amd ryzen_7_4700u -
amd ryzen_7_4800h -
amd ryzen_7_4800hs -
amd ryzen_7_4980u -
amd ryzen_7_5700g -
amd ryzen_7_5700ge -
amd ryzen_7_5700u -
amd ryzen_9_4900h -
amd ryzen_9_4900hs -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4",
                     versionEndExcluding: "23.10.01.46",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4D55B9D-4BAB-4082-A33F-626E15229333",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08718840-D468-4E86-8FFF-A2B1841E6BF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1A4CCCB-01CC-4488-9336-C0C379ABE609",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2C17AD1-F813-484D-AC73-4A9BBCE233BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C95A2886-F2CC-45A3-8877-AE894FF86898",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "244CD6EC-780A-405E-8CFA-666A666FF7D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D391590-652D-4B98-89F1-9F31F479448B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135",
                     versionEndExcluding: "23.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467",
                     versionEndExcluding: "23.q3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52880029-7A09-47F5-84B9-7A8A77D883F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40A38A14-D45C-4746-BCDC-D26D178B1426",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D89E1B8-509D-428E-984C-E23D808A0006",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135",
                     versionEndExcluding: "23.7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467",
                     versionEndExcluding: "23.q3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7774C021-B18A-473A-90B5-48A95071E5BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "263E53BD-7A57-40AC-8A35-D761BD3895A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E02A9C95-DF12-4816-88C3-6AFC331B8426",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDA92163-5A72-4271-89D4-401C24950F62",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "510FB098-A28C-46AD-9244-438DC828A007",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "954500F1-6466-4A1C-8E0C-D759121CEBDC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A4079E-01E9-4807-A293-F6E843752554",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D111819-345A-4BAF-83D0-1153209AFCEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D70D28B-809E-456C-96ED-84A4CA7EC942",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C5F418C-2989-44C0-A880-A7BBA067E581",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n",
      },
      {
         lang: "es",
         value: "La verificación inadecuada de la firma del controlador RadeonTM RX Vega M Graphics para Windows puede permitir que un atacante con privilegios de administrador inicie RadeonInstaller.exe sin validar la firma del archivo, lo que podría provocar la ejecución de código arbitrario.",
      },
   ],
   id: "CVE-2023-20568",
   lastModified: "2024-11-21T07:41:08.400",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T19:15:15.930",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
      },
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-347",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.",
      },
      {
         lang: "es",
         value: "La interfaz de llamada de escape en AMD Graphics Driver para Windows puede causar una escalada de privilegios",
      },
   ],
   id: "CVE-2020-12962",
   lastModified: "2024-11-21T05:00:35.480",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T20:15:19.743",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
                     versionEndExcluding: "21.q1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de lectura y escritura fuera de los límites en el controlador de gráficos AMD para Windows 10 puede conllevar a una escalada de privilegios o denegación de servicio",
      },
   ],
   id: "CVE-2020-12980",
   lastModified: "2024-11-21T05:00:36.517",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-11T22:15:11.337",
   references: [
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
                     versionEndExcluding: "21.q1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad sin puntero de objeto no válido en el controlador de gráficos AMD para Windows 10 puede conllevar a una escalada de privilegios o denegación de servicio",
      },
   ],
   id: "CVE-2020-12982",
   lastModified: "2024-11-21T05:00:36.770",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-11T22:15:11.410",
   references: [
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-763",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 19:15
Modified
2024-11-21 05:00
Summary
An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3017A2C8-6079-4639-952E-E895FB6CB9A2",
                     versionEndExcluding: "21.3.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.",
      },
      {
         lang: "es",
         value: "Una ruta de búsqueda no confiable en el instalador de configuración de AMD Radeon puede conllevar a una escalada de privilegios o una ejecución de código no autorizada",
      },
   ],
   id: "CVE-2020-12892",
   lastModified: "2024-11-21T05:00:30.540",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T19:15:07.187",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-426",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Summary
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
Impacted products
Vendor Product Version
amd enterprise_driver *
amd radeon_pro_software *
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
                     versionEndExcluding: "22.10.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
                     versionEndExcluding: "22.q2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
                     versionEndExcluding: "22.5.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.",
      },
      {
         lang: "es",
         value: "La verificación insuficiente de múltiples firmas de encabezado mientras se carga una aplicación confiable (TA) puede permitir que un atacante con privilegios obtenga la ejecución de código en esa TA o el sistema operativo/kernel.",
      },
   ],
   id: "CVE-2021-26391",
   lastModified: "2024-11-21T05:56:16.620",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-09T21:15:12.150",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
                     versionEndExcluding: "21.q1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de comprobación de puntero insuficiente en el controlador de gráficos AMD para Windows 10 puede causar la ejecución de código arbitrario en el kernel, lo que lleva a una escalada de privilegios o denegación de servicio",
      },
   ],
   id: "CVE-2020-12986",
   lastModified: "2024-11-21T05:00:37.113",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-11T22:15:11.540",
   references: [
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .",
      },
      {
         lang: "es",
         value: "Una comprobación inapropiada de parámetros en algunas aplicaciones confiable de la PSP contenida en AMD Graphics Driver puede permitir a un atacante local omitir las restricciones de seguridad y lograr una ejecución de código arbitrario",
      },
   ],
   id: "CVE-2020-12929",
   lastModified: "2024-11-21T05:00:33.343",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T16:15:09.433",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Summary
A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.
Impacted products
Vendor Product Version
amd radeon_software -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F810170-5792-4C69-9D0A-DC9422CB3D90",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6678421F-CD05-445F-B114-293609732777",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC4BECA-6023-4225-9685-937E47C67C1F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B75781D-051F-44C1-B79F-1C32AFECFF65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D7F33C-F522-4A20-9055-1662178D7F27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2093BCDB-70F3-4D90-B899-B2801F8A6059",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.",
      },
      {
         lang: "es",
         value: "Una UApp o ABL maliciosa o comprometida puede ser usada por un atacante para emitir una llamada al sistema malformada que resulte en el mapeo de registros confidenciales de System Management Network (SMN) conllevando a una pérdida de integridad y disponibilidad",
      },
   ],
   id: "CVE-2021-26362",
   lastModified: "2024-11-21T05:56:12.600",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.6,
               confidentialityImpact: "NONE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 9.2,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-12T18:16:53.183",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:00
Summary
Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Impacted products
Vendor Product Version
amd enterprise_driver *
amd radeon_pro_software *
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd ryzen_3_2200ge_firmware -
amd ryzen_3_2200ge -
amd ryzen_3_2200g_firmware -
amd ryzen_3_2200g -
amd ryzen_5_2400ge_firmware -
amd ryzen_5_2400ge -
amd ryzen_5_2400g_firmware -
amd ryzen_5_2400g -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_5_3500_firmware -
amd ryzen_5_3500 -
amd ryzen_5_3500x_firmware -
amd ryzen_5_3500x -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_9_3900_firmware -
amd ryzen_9_3900 -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3900xt_firmware -
amd ryzen_9_3900xt -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_5_5500_firmware -
amd ryzen_5_5500 -
amd ryzen_5_5600_firmware -
amd ryzen_5_5600 -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_7_5700x_firmware -
amd ryzen_7_5700x -
amd ryzen_7_5800x_firmware -
amd ryzen_7_5800x -
amd ryzen_7_5800_firmware -
amd ryzen_7_5800 -
amd ryzen_7_5800x3d_firmware -
amd ryzen_7_5800x3d -
amd ryzen_9_5900_firmware -
amd ryzen_9_5900 -
amd ryzen_9_5900x_firmware -
amd ryzen_9_5900x -
amd ryzen_9_5950x_firmware -
amd ryzen_9_5950x -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -
amd athlon_silver_3050e_firmware -
amd athlon_silver_3050e -
amd athlon_pro_3045b_firmware -
amd athlon_pro_3045b -
amd athlon_silver_3050u_firmware -
amd athlon_silver_3050u -
amd athlon_silver_3050c_firmware -
amd athlon_silver_3050c -
amd athlon_pro_3145b_firmware -
amd athlon_pro_3145b -
amd athlon_gold_3150u_firmware -
amd athlon_gold_3150u -
amd athlon_gold_3150c_firmware -
amd athlon_gold_3150c -
amd ryzen_3_3250u_firmware -
amd ryzen_3_3250u -
amd ryzen_3_3250c_firmware -
amd ryzen_3_3250c -
amd amd_3020e_firmware -
amd amd_3020e -
amd amd_3015e_firmware -
amd amd_3015e -
amd amd_3015ce_firmware -
amd amd_3015ce -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_3_3300u_firmware -
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware -
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware -
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware -
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware -
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware -
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware -
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware -
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware -
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware -
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware -
amd ryzen_7_3780u -
amd ryzen_3_pro_3200ge_firmware -
amd ryzen_3_pro_3200ge -
amd ryzen_3_3200g_firmware -
amd ryzen_3_3200g -
amd ryzen_3_pro_3200g_firmware -
amd ryzen_3_pro_3200g -
amd ryzen_5_pro_3350ge_firmware -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3350g_firmware -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3400ge_firmware -
amd ryzen_5_pro_3400ge -
amd ryzen_5_pro_3400g_firmware -
amd ryzen_5_pro_3400g -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
                     versionEndExcluding: "22.10.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
                     versionEndExcluding: "22.q2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
                     versionEndExcluding: "22.5.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3C57977-E2BA-494F-AA3C-B460117B2996",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0D0E24-0615-4F6C-947D-CFA59D114486",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "41C3746E-6D5F-47B5-BE13-1A6DC004F79B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B682A8FF-B83F-41A5-BA22-4394EC0C4457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B38ABACD-4E5D-440C-9464-C894DB610C94",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B230F1D4-FF59-43E5-BC20-0BCD43A55683",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2503E43D-8415-4702-B7AA-22C472F4BE51",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09ADB589-F43C-43A5-8CA6-B9D4D3294880",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F0E87F5-65BA-477D-9679-907FD2906298",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A56423-3DDE-451B-AC47-51715AC74F41",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927B2661-8988-484F-965C-D94AA9D52911",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D814C2A-D794-46A8-9A06-CC4DB387176F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4350ADE3-9A31-4A23-9B15-7A44E8F29E90",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E52108F-FAAE-4075-8F87-239008E77009",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E309B1D5-E232-4F26-BF35-25A1542A5E10",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E68C36-118D-41F9-900E-9F38F585A34D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E654C546-AAEE-4DDA-81B4-144DD5766F9F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "487D6661-ECA7-44C0-BD46-FC8C03187B85",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "777D94BA-613B-49E9-B1B3-2A9E0FC35908",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34045719-7683-4621-929B-5F6B16B6A580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "331E829F-D05A-4D6D-A017-A2BE0D7C3D09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EE2DD3E-51C4-4E21-BC43-CE567812B59A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54611A05-BCA3-495A-8CDB-946FF47E0333",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CC4654E-519B-4412-B551-F2436108152B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "951CA892-BAE2-46A4-BC86-0A205A4FA218",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6882B4E1-0BFF-4093-BE67-72294949C3F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CFF28BE-F049-4716-AADE-643FABB753A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E741A31-8265-45E0-9834-23D00D5F8176",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "610909ED-A636-4007-A50F-500057340E70",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E11A9D-03EC-4014-BB1C-5286C694581B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0C29793-1142-4506-8C32-3B89227BB3A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "913A2DC9-4215-486B-BD15-3AF515E3CDCC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DF8A936-58AE-44BB-897E-44782232394F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FC3889-3F62-48AC-876D-5A630A5E2AD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D79E460A-D34C-4120-8529-F32988793DC6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "069392FC-51DB-49F0-B30B-8ED46C694057",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9921AE2D-F497-47C8-B463-947E230CF4F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2452A625-5B59-49DF-A3C3-872642181E9D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51D4403E-C626-4817-B0C9-ECEC420C517D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533144EB-802F-496D-8C09-15AEA537F89B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFDD574D-1799-4386-A906-705DC2F0978F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58EE3F9B-6950-4F83-B0BE-ADA560457BC1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B16B55B-11B3-43DB-860A-62CD3020B536",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8C6F103-30CC-4738-B489-B12790836B1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE2EC993-8A65-416B-939F-1C707D596AF9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0359E9DA-5BC0-48FD-962C-34358691E7DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "945182A3-1BE3-459D-BC45-5554FB905C3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "228E3FBD-F997-402D-AE96-B14D66390700",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF105508-6252-4101-92B5-ECA9022D4720",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "926812AD-94F0-4CB8-9890-EAB11FDC1804",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9724784-3A56-4175-9829-796CF687CA09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40933267-3CEF-417E-BE95-37B562F37E78",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.",
      },
      {
         lang: "es",
         value: "El manejo inadecuado de los parámetros en los controladores del AMD Secure Processor (ASP) puede permitir que un atacante privilegiado eleve sus privilegios, lo que podría provocar una pérdida de integridad.",
      },
   ],
   id: "CVE-2020-12930",
   lastModified: "2024-11-21T05:00:33.470",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-09T21:15:10.580",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:28
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "F71B3286-B679-4DC0-BDD1-784AC5577094",
                     versionEndExcluding: "23.12.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49540C5D-CEC7-4BCB-882B-73843CAFD55A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "4397FD7C-3357-4F01-98F4-131000D23AA0",
                     versionEndIncluding: "23.q4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.",
      },
      {
         lang: "es",
         value: "Una validación de dirección DRAM insuficiente en PMFW puede permitir que un atacante privilegiado lea desde una dirección DRAM no válida a SRAM, lo que podría provocar corrupción de datos o denegación de servicio.",
      },
   ],
   id: "CVE-2023-20510",
   lastModified: "2024-12-12T20:28:55.010",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.5,
            impactScore: 4.2,
            source: "psirt@amd.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-08-13T17:15:18.777",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
                     versionEndExcluding: "21.q1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.",
      },
      {
         lang: "es",
         value: "Una comprobación de entrada insuficiente en el controlador de gráficos AMD para Windows 10 puede permitir que los usuarios sin privilegios descarguen el controlador, lo que podría causar daños en la memoria en los procesos con muchos privilegios, lo que puede conllevar a una escalada de privilegios o la denegación de servicio",
      },
   ],
   id: "CVE-2020-12981",
   lastModified: "2024-11-21T05:00:36.650",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-11T22:15:11.373",
   references: [
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.",
      },
      {
         lang: "es",
         value: "Un Uso de Memoria Previamente Liberada en AMD Graphics Driver para Windows 10 puede conllevar un desvío de KASLR o la divulgación de información",
      },
   ],
   id: "CVE-2020-12901",
   lastModified: "2024-11-21T05:00:31.603",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T20:15:19.560",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-02-04 23:15
Modified
2024-11-21 05:00
Summary
AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.
Impacted products
Vendor Product Version
amd radeon_pro_software *
amd radeon_software *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "C5BBBA61-F9B3-41D4-BAD1-8D31C9868F6F",
                     versionEndExcluding: "21.q2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "00350248-7850-480A-BACF-89DC9194F34E",
                     versionEndExcluding: "21.4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.",
      },
      {
         lang: "es",
         value: "El software Radeon de AMD puede ser vulnerable a un secuestro de DLL mediante la variable de ruta. Un usuario no privilegiado puede ser capaz de soltar su archivo DLL malicioso en cualquier ubicación que esté en la variable de entorno path",
      },
   ],
   id: "CVE-2020-12891",
   lastModified: "2024-11-21T05:00:30.393",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-02-04T23:15:10.247",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.",
      },
      {
         lang: "es",
         value: "Una lectura arbitraria en AMD Graphics Driver para Windows 10 puede conllevar a una omisión de KASLR o una denegación de servicio",
      },
   ],
   id: "CVE-2020-12899",
   lastModified: "2024-11-21T05:00:31.330",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T16:15:09.177",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Summary
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
Impacted products
Vendor Product Version
amd radeon_software -
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300g_firmware -
amd ryzen_3_3300g -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_5_3450g_firmware -
amd ryzen_5_3450g -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_threadripper_2920x_firmware -
amd ryzen_threadripper_2920x -
amd ryzen_threadripper_2950x_firmware -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2970wx_firmware -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2990wx_firmware -
amd ryzen_threadripper_2990wx -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F810170-5792-4C69-9D0A-DC9422CB3D90",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6678421F-CD05-445F-B114-293609732777",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBA86063-6EE8-446E-BCE1-210B0699103B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC4BECA-6023-4225-9685-937E47C67C1F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94AB5202-A5A2-479E-B4B0-347C823201AD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B75781D-051F-44C1-B79F-1C32AFECFF65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D7F33C-F522-4A20-9055-1662178D7F27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2093BCDB-70F3-4D90-B899-B2801F8A6059",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27CDB416-B093-4871-8142-1D7EB5BF90B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454A72B-76EC-46D9-8675-97DC076D7615",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.",
      },
      {
         lang: "es",
         value: "Una UApp o ABL maliciosa o comprometida puede ser usada por un atacante para enviar una llamada al sistema malformada al cargador de arranque, resultando en accesos a memoria fuera de límites",
      },
   ],
   id: "CVE-2021-26369",
   lastModified: "2024-11-21T05:56:13.677",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-12T18:16:53.257",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Summary
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
                     versionEndExcluding: "22.10.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
                     versionEndExcluding: "22.q2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
                     versionEndExcluding: "22.5.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.",
      },
      {
         lang: "es",
         value: "Un atacante con acceso local al sistema puede realizar modificaciones no autorizadas en la configuración de seguridad de los registros SOC. Esto podría permitir una posible corrupción del contenido de la memoria cifrada del procesador seguro AMD, lo que podría provocar la ejecución de código arbitrario en ASP.",
      },
   ],
   id: "CVE-2021-26360",
   lastModified: "2024-11-21T05:56:12.317",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-09T21:15:11.690",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:00
Summary
Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Impacted products
Vendor Product Version
amd enterprise_driver *
amd radeon_pro_software *
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd ryzen_3_2200ge_firmware -
amd ryzen_3_2200ge -
amd ryzen_3_2200g_firmware -
amd ryzen_3_2200g -
amd ryzen_5_2400ge_firmware -
amd ryzen_5_2400ge -
amd ryzen_5_2400g_firmware -
amd ryzen_5_2400g -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_5_3500_firmware -
amd ryzen_5_3500 -
amd ryzen_5_3500x_firmware -
amd ryzen_5_3500x -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_9_3900_firmware -
amd ryzen_9_3900 -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3900xt_firmware -
amd ryzen_9_3900xt -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_5_5500_firmware -
amd ryzen_5_5500 -
amd ryzen_5_5600_firmware -
amd ryzen_5_5600 -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_7_5700x_firmware -
amd ryzen_7_5700x -
amd ryzen_7_5800x_firmware -
amd ryzen_7_5800x -
amd ryzen_7_5800_firmware -
amd ryzen_7_5800 -
amd ryzen_7_5800x3d_firmware -
amd ryzen_7_5800x3d -
amd ryzen_9_5900_firmware -
amd ryzen_9_5900 -
amd ryzen_9_5900x_firmware -
amd ryzen_9_5900x -
amd ryzen_9_5950x_firmware -
amd ryzen_9_5950x -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -
amd athlon_silver_3050e_firmware -
amd athlon_silver_3050e -
amd athlon_pro_3045b_firmware -
amd athlon_pro_3045b -
amd athlon_silver_3050u_firmware -
amd athlon_silver_3050u -
amd athlon_silver_3050c_firmware -
amd athlon_silver_3050c -
amd athlon_pro_3145b_firmware -
amd athlon_pro_3145b -
amd athlon_gold_3150u_firmware -
amd athlon_gold_3150u -
amd athlon_gold_3150c_firmware -
amd athlon_gold_3150c -
amd ryzen_3_3250u_firmware -
amd ryzen_3_3250u -
amd ryzen_3_3250c_firmware -
amd ryzen_3_3250c -
amd amd_3020e_firmware -
amd amd_3020e -
amd amd_3015e_firmware -
amd amd_3015e -
amd amd_3015ce_firmware -
amd amd_3015ce -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_3_3300u_firmware -
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware -
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware -
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware -
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware -
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware -
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware -
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware -
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware -
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware -
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware -
amd ryzen_7_3780u -
amd ryzen_3_pro_3200ge_firmware -
amd ryzen_3_pro_3200ge -
amd ryzen_3_3200g_firmware -
amd ryzen_3_3200g -
amd ryzen_3_pro_3200g_firmware -
amd ryzen_3_pro_3200g -
amd ryzen_5_pro_3350ge_firmware -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3350g_firmware -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3400ge_firmware -
amd ryzen_5_pro_3400ge -
amd ryzen_5_pro_3400g_firmware -
amd ryzen_5_pro_3400g -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
                     versionEndExcluding: "22.10.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
                     versionEndExcluding: "22.q2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
                     versionEndExcluding: "22.5.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3C57977-E2BA-494F-AA3C-B460117B2996",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0D0E24-0615-4F6C-947D-CFA59D114486",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "41C3746E-6D5F-47B5-BE13-1A6DC004F79B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B682A8FF-B83F-41A5-BA22-4394EC0C4457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B38ABACD-4E5D-440C-9464-C894DB610C94",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B230F1D4-FF59-43E5-BC20-0BCD43A55683",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2503E43D-8415-4702-B7AA-22C472F4BE51",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09ADB589-F43C-43A5-8CA6-B9D4D3294880",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F0E87F5-65BA-477D-9679-907FD2906298",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51A56423-3DDE-451B-AC47-51715AC74F41",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "927B2661-8988-484F-965C-D94AA9D52911",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D814C2A-D794-46A8-9A06-CC4DB387176F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4350ADE3-9A31-4A23-9B15-7A44E8F29E90",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E52108F-FAAE-4075-8F87-239008E77009",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E309B1D5-E232-4F26-BF35-25A1542A5E10",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E68C36-118D-41F9-900E-9F38F585A34D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E654C546-AAEE-4DDA-81B4-144DD5766F9F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "487D6661-ECA7-44C0-BD46-FC8C03187B85",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "777D94BA-613B-49E9-B1B3-2A9E0FC35908",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34045719-7683-4621-929B-5F6B16B6A580",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "331E829F-D05A-4D6D-A017-A2BE0D7C3D09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EE2DD3E-51C4-4E21-BC43-CE567812B59A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54611A05-BCA3-495A-8CDB-946FF47E0333",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CC4654E-519B-4412-B551-F2436108152B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "951CA892-BAE2-46A4-BC86-0A205A4FA218",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6882B4E1-0BFF-4093-BE67-72294949C3F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CFF28BE-F049-4716-AADE-643FABB753A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E741A31-8265-45E0-9834-23D00D5F8176",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "610909ED-A636-4007-A50F-500057340E70",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E11A9D-03EC-4014-BB1C-5286C694581B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0C29793-1142-4506-8C32-3B89227BB3A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "913A2DC9-4215-486B-BD15-3AF515E3CDCC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DF8A936-58AE-44BB-897E-44782232394F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FC3889-3F62-48AC-876D-5A630A5E2AD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D79E460A-D34C-4120-8529-F32988793DC6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "069392FC-51DB-49F0-B30B-8ED46C694057",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9921AE2D-F497-47C8-B463-947E230CF4F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2452A625-5B59-49DF-A3C3-872642181E9D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51D4403E-C626-4817-B0C9-ECEC420C517D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533144EB-802F-496D-8C09-15AEA537F89B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFDD574D-1799-4386-A906-705DC2F0978F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58EE3F9B-6950-4F83-B0BE-ADA560457BC1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B16B55B-11B3-43DB-860A-62CD3020B536",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8C6F103-30CC-4738-B489-B12790836B1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE2EC993-8A65-416B-939F-1C707D596AF9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0359E9DA-5BC0-48FD-962C-34358691E7DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "945182A3-1BE3-459D-BC45-5554FB905C3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "228E3FBD-F997-402D-AE96-B14D66390700",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF105508-6252-4101-92B5-ECA9022D4720",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "926812AD-94F0-4CB8-9890-EAB11FDC1804",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9724784-3A56-4175-9829-796CF687CA09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40933267-3CEF-417E-BE95-37B562F37E78",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.",
      },
      {
         lang: "es",
         value: "El manejo inadecuado de los parámetros en el kernel del AMD Secure Processor (ASP) puede permitir que un atacante privilegiado eleve sus privilegios, lo que podría provocar una pérdida de integridad.",
      },
   ],
   id: "CVE-2020-12931",
   lastModified: "2024-11-21T05:00:33.803",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-09T21:15:11.407",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-13 16:30
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "F71B3286-B679-4DC0-BDD1-784AC5577094",
                     versionEndExcluding: "23.12.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49540C5D-CEC7-4BCB-882B-73843CAFD55A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "4397FD7C-3357-4F01-98F4-131000D23AA0",
                     versionEndIncluding: "23.q4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.",
      },
      {
         lang: "es",
         value: "La validación inadecuada del índice de matriz en el firmware de administración de energía (PMFW) puede permitir que un atacante privilegiado provoque una lectura de memoria fuera de los límites dentro de PMFW, lo que podría provocar una denegación de servicio.",
      },
   ],
   id: "CVE-2023-31307",
   lastModified: "2024-12-13T16:30:30.840",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "LOW",
               baseScore: 2.3,
               baseSeverity: "LOW",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 1.4,
            source: "psirt@amd.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-08-13T17:15:20.500",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-129",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-129",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.",
      },
      {
         lang: "es",
         value: "Una escritura arbitraria en AMD Graphics Driver para Windows 10 en el escape 0x40010d puede conllevar a una escritura arbitraria en la memoria del kernel o una denegación de servicio",
      },
   ],
   id: "CVE-2020-12894",
   lastModified: "2024-11-21T05:00:30.813",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.6,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T20:15:19.513",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-11-12 18:15
Modified
2024-11-27 16:20
Summary
Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "8B95FEA4-F26E-45B0-9663-CF6730DB8400",
                     versionEndExcluding: "24.6.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:cloud:*:*:*",
                     matchCriteriaId: "D3C200C2-56EB-4CD0-9EBF-D8D3BFE51CA5",
                     versionEndExcluding: "24.7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "3C8C56D8-EA82-4166-AC00-A8416DA471FC",
                     versionEndExcluding: "24.q2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software_for_hip:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "CB85FB48-9901-49CC-A2AA-47AFC6B134B4",
                     versionEndExcluding: "24.10.16",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.",
      },
      {
         lang: "es",
         value: "Los permisos predeterminados incorrectos en el directorio de instalación del SDK AMD HIP podrían permitir que un atacante logre una escalada de privilegios que potencialmente resulte en la ejecución de código arbitrario.",
      },
   ],
   id: "CVE-2024-21937",
   lastModified: "2024-11-27T16:20:37.073",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 5.9,
            source: "psirt@amd.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-11-12T18:15:17.863",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6015.html",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-276",
            },
         ],
         source: "psirt@amd.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-276",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en AMD Graphics Driver para Windows 10 en el escape 0x3004403 puede conllevar a una divulgación de información arbitraria",
      },
   ],
   id: "CVE-2020-12905",
   lastModified: "2024-11-21T05:00:32.200",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T20:15:19.647",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-12 19:15
Modified
2024-11-21 05:56
Summary
A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.
Impacted products
Vendor Product Version
amd radeon_software -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300g_firmware -
amd ryzen_3_3300g -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_5_3450g_firmware -
amd ryzen_5_3450g -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBA86063-6EE8-446E-BCE1-210B0699103B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94AB5202-A5A2-479E-B4B0-347C823201AD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.",
      },
      {
         lang: "es",
         value: "Una UApp o ABL maliciosa o comprometida podría potencialmente cambiar el valor que el ASP usa para su DRAM reservada, a uno fuera del área cercada, conllevando potencialmente a una exposición de datos",
      },
   ],
   id: "CVE-2021-26363",
   lastModified: "2024-11-21T05:56:12.753",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 3.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 2.5,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-12T19:15:48.107",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
                     versionEndExcluding: "21.q1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de escritura fuera de los límites en el controlador de gráficos AMD para Windows 10 puede conllevar a una escalada de privilegios o la denegación de servicio",
      },
   ],
   id: "CVE-2020-12983",
   lastModified: "2024-11-21T05:00:36.880",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-11T22:15:11.440",
   references: [
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3017A2C8-6079-4639-952E-E895FB6CB9A2",
                     versionEndExcluding: "21.3.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.",
      },
      {
         lang: "es",
         value: "Una divulgación de la Dirección de Pool del Kernel en AMD Graphics Driver para Windows 10 puede conllevar a una omisión de KASLR",
      },
   ],
   id: "CVE-2020-12897",
   lastModified: "2024-11-21T05:00:31.083",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T16:15:09.130",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Summary
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
Impacted products
Vendor Product Version
amd enterprise_driver *
amd radeon_pro_software *
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd ryzen_3_2200ge_firmware -
amd ryzen_3_2200ge -
amd ryzen_3_2200g_firmware -
amd ryzen_3_2200g -
amd ryzen_5_2400ge_firmware -
amd ryzen_5_2400ge -
amd ryzen_5_2400g_firmware -
amd ryzen_5_2400g -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd athlon_silver_3050e_firmware -
amd athlon_silver_3050e -
amd athlon_pro_3045b_firmware -
amd athlon_pro_3045b -
amd athlon_silver_3050u_firmware -
amd athlon_silver_3050u -
amd athlon_silver_3050c_firmware -
amd athlon_silver_3050c -
amd athlon_pro_3145b_firmware -
amd athlon_pro_3145b -
amd athlon_gold_3150u_firmware -
amd athlon_gold_3150u -
amd athlon_gold_3150c_firmware -
amd athlon_gold_3150c -
amd ryzen_3_3250u_firmware -
amd ryzen_3_3250u -
amd ryzen_3_3250c_firmware -
amd ryzen_3_3250c -
amd amd_3020e_firmware -
amd amd_3020e -
amd amd_3015e_firmware -
amd amd_3015e -
amd amd_3015ce_firmware -
amd amd_3015ce -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_3_3300u_firmware -
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware -
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware -
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware -
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware -
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware -
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware -
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware -
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware -
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware -
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware -
amd ryzen_7_3780u -
amd ryzen_3_pro_3200ge_firmware -
amd ryzen_3_pro_3200ge -
amd ryzen_3_3200g_firmware -
amd ryzen_3_3200g -
amd ryzen_3_pro_3200g_firmware -
amd ryzen_3_pro_3200g -
amd ryzen_5_pro_3350ge_firmware -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3350g_firmware -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3400ge_firmware -
amd ryzen_5_pro_3400ge -
amd ryzen_5_pro_3400g_firmware -
amd ryzen_5_pro_3400g -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
                     versionEndExcluding: "22.10.20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
                     versionEndExcluding: "22.q2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
                     versionEndExcluding: "22.5.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3C57977-E2BA-494F-AA3C-B460117B2996",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0D0E24-0615-4F6C-947D-CFA59D114486",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "41C3746E-6D5F-47B5-BE13-1A6DC004F79B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B682A8FF-B83F-41A5-BA22-4394EC0C4457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B38ABACD-4E5D-440C-9464-C894DB610C94",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B230F1D4-FF59-43E5-BC20-0BCD43A55683",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2503E43D-8415-4702-B7AA-22C472F4BE51",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09ADB589-F43C-43A5-8CA6-B9D4D3294880",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "951CA892-BAE2-46A4-BC86-0A205A4FA218",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6882B4E1-0BFF-4093-BE67-72294949C3F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CFF28BE-F049-4716-AADE-643FABB753A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E741A31-8265-45E0-9834-23D00D5F8176",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "610909ED-A636-4007-A50F-500057340E70",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E11A9D-03EC-4014-BB1C-5286C694581B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0C29793-1142-4506-8C32-3B89227BB3A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "913A2DC9-4215-486B-BD15-3AF515E3CDCC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DF8A936-58AE-44BB-897E-44782232394F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FC3889-3F62-48AC-876D-5A630A5E2AD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D79E460A-D34C-4120-8529-F32988793DC6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "069392FC-51DB-49F0-B30B-8ED46C694057",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9921AE2D-F497-47C8-B463-947E230CF4F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2452A625-5B59-49DF-A3C3-872642181E9D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51D4403E-C626-4817-B0C9-ECEC420C517D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533144EB-802F-496D-8C09-15AEA537F89B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFDD574D-1799-4386-A906-705DC2F0978F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58EE3F9B-6950-4F83-B0BE-ADA560457BC1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B16B55B-11B3-43DB-860A-62CD3020B536",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8C6F103-30CC-4738-B489-B12790836B1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE2EC993-8A65-416B-939F-1C707D596AF9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0359E9DA-5BC0-48FD-962C-34358691E7DC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "945182A3-1BE3-459D-BC45-5554FB905C3A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "228E3FBD-F997-402D-AE96-B14D66390700",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF105508-6252-4101-92B5-ECA9022D4720",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "926812AD-94F0-4CB8-9890-EAB11FDC1804",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9724784-3A56-4175-9829-796CF687CA09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40933267-3CEF-417E-BE95-37B562F37E78",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.",
      },
      {
         lang: "es",
         value: "Una limpieza de memoria insuficiente en AMD Secure Processor (ASP) Trusted Execution Environment (TEE)  puede permitir que un atacante autenticado con privilegios genere un TA firmado válido y potencialmente envenenar el contenido de la memoria del proceso con datos controlados por el atacante, lo que resulta en una pérdida de confidencialidad.",
      },
   ],
   id: "CVE-2021-26393",
   lastModified: "2024-11-21T05:56:17.503",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-09T21:15:12.607",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-401",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:34
Summary
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
Impacted products
Vendor Product Version
intel radeon_rx_vega_m_firmware *
intel core_i5-8305g -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel nuc_8_enthusiast_nuc8i7hnkqc -
intel nuc_8_enthusiast_nuc8i7hvkva -
intel nuc_8_enthusiast_nuc8i7hvkvaw -
intel nuc_kit_nuc8i7hnk -
intel nuc_kit_nuc8i7hvk -
amd radeon_software *
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_7600 -
amd radeon_rx_7600m -
amd radeon_rx_7600m_xt -
amd radeon_rx_7600s -
amd radeon_rx_7700_xt -
amd radeon_rx_7700s -
amd radeon_rx_7800_xt -
amd radeon_rx_7900_gre -
amd radeon_rx_7900_xt -
amd radeon_rx_7900_xtx -
amd radeon_rx_7900m -
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300 -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_pro_w7500 -
amd radeon_pro_w7600 -
amd radeon_pro_w7800 -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd radeon_pro_vega_56_firmware -
amd radeon_pro_vega_56 -
amd radeon_pro_vega_64_firmware -
amd radeon_pro_vega_64 -
amd radeon_software *
amd radeon_software *
amd ryzen_3_3015ce -
amd ryzen_3_3015e -
amd ryzen_3_4100 -
amd ryzen_3_4300g -
amd ryzen_3_4300ge -
amd ryzen_3_4300u -
amd ryzen_3_5300g -
amd ryzen_3_5300ge -
amd ryzen_3_5300u -
amd ryzen_5_4500 -
amd ryzen_5_4500u -
amd ryzen_5_4600g -
amd ryzen_5_4600ge -
amd ryzen_5_4600h -
amd ryzen_5_4600hs -
amd ryzen_5_4600u -
amd ryzen_5_4680u -
amd ryzen_5_5500h -
amd ryzen_5_5500u -
amd ryzen_5_5600g -
amd ryzen_5_5600ge -
amd ryzen_5_pro_3200g -
amd ryzen_5_pro_3200ge -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3400g -
amd ryzen_5_pro_3400ge -
amd ryzen_7_4700g -
amd ryzen_7_4700ge -
amd ryzen_7_4700u -
amd ryzen_7_4800h -
amd ryzen_7_4800hs -
amd ryzen_7_4980u -
amd ryzen_7_5700g -
amd ryzen_7_5700ge -
amd ryzen_7_5700u -
amd ryzen_9_4900h -
amd ryzen_9_4900hs -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4",
                     versionEndExcluding: "23.10.01.46",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4D55B9D-4BAB-4082-A33F-626E15229333",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08718840-D468-4E86-8FFF-A2B1841E6BF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1A4CCCB-01CC-4488-9336-C0C379ABE609",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2C17AD1-F813-484D-AC73-4A9BBCE233BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C95A2886-F2CC-45A3-8877-AE894FF86898",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "244CD6EC-780A-405E-8CFA-666A666FF7D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D391590-652D-4B98-89F1-9F31F479448B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135",
                     versionEndExcluding: "23.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467",
                     versionEndExcluding: "23.q3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52880029-7A09-47F5-84B9-7A8A77D883F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40A38A14-D45C-4746-BCDC-D26D178B1426",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D89E1B8-509D-428E-984C-E23D808A0006",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135",
                     versionEndExcluding: "23.7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467",
                     versionEndExcluding: "23.q3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7774C021-B18A-473A-90B5-48A95071E5BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "263E53BD-7A57-40AC-8A35-D761BD3895A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E02A9C95-DF12-4816-88C3-6AFC331B8426",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDA92163-5A72-4271-89D4-401C24950F62",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "510FB098-A28C-46AD-9244-438DC828A007",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "954500F1-6466-4A1C-8E0C-D759121CEBDC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A4079E-01E9-4807-A293-F6E843752554",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D111819-345A-4BAF-83D0-1153209AFCEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D70D28B-809E-456C-96ED-84A4CA7EC942",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C5F418C-2989-44C0-A880-A7BBA067E581",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n",
      },
      {
         lang: "es",
         value: "Una verificación de límites insuficiente en el ASP (AMD Secure Processor) puede permitir que un atacante acceda a la memoria fuera de los límites de lo permitido para una TA (Trusted Application), lo que resulta en una posible denegación de servicio.",
      },
   ],
   id: "CVE-2021-46748",
   lastModified: "2024-11-21T06:34:37.687",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T19:15:10.267",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
      },
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Summary
An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.
Impacted products
Vendor Product Version
amd radeon_software -
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300g_firmware -
amd ryzen_3_3300g -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_5_3450g_firmware -
amd ryzen_5_3450g -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_threadripper_2920x_firmware -
amd ryzen_threadripper_2920x -
amd ryzen_threadripper_2950x_firmware -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2970wx_firmware -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2990wx_firmware -
amd ryzen_threadripper_2990wx -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F810170-5792-4C69-9D0A-DC9422CB3D90",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6678421F-CD05-445F-B114-293609732777",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBA86063-6EE8-446E-BCE1-210B0699103B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC4BECA-6023-4225-9685-937E47C67C1F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94AB5202-A5A2-479E-B4B0-347C823201AD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B75781D-051F-44C1-B79F-1C32AFECFF65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D7F33C-F522-4A20-9055-1662178D7F27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2093BCDB-70F3-4D90-B899-B2801F8A6059",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27CDB416-B093-4871-8142-1D7EB5BF90B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454A72B-76EC-46D9-8675-97DC076D7615",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54611A05-BCA3-495A-8CDB-946FF47E0333",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CC4654E-519B-4412-B551-F2436108152B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.",
      },
      {
         lang: "es",
         value: "Un atacante, que haya obtenido altos privilegios por algún otro tipo de vulnerabilidad, puede ser capaz de leer los datos de la ROM de arranque, resultando en una pérdida de la integridad del sistema",
      },
   ],
   id: "CVE-2021-26366",
   lastModified: "2024-11-21T05:56:13.280",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 3.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 7.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-12T18:16:53.217",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.",
      },
      {
         lang: "es",
         value: "Una lectura y escritura fuera de límites en AMD Graphics Driver para Windows 10 en Escape 0x6002d03 puede conllevar a una escalada de privilegios o una denegación de servicio",
      },
   ],
   id: "CVE-2020-12903",
   lastModified: "2024-11-21T05:00:31.920",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T20:15:19.603",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Summary
A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.
Impacted products
Vendor Product Version
amd radeon_software -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F810170-5792-4C69-9D0A-DC9422CB3D90",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6678421F-CD05-445F-B114-293609732777",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC4BECA-6023-4225-9685-937E47C67C1F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B75781D-051F-44C1-B79F-1C32AFECFF65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D7F33C-F522-4A20-9055-1662178D7F27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2093BCDB-70F3-4D90-B899-B2801F8A6059",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.",
      },
      {
         lang: "es",
         value: "Un atacante podría usar una aplicación de usuario (UApp) o un cargador de arranque AGESA (ABL) maliciosos o comprometidos para extraer memoria arbitraria del cargador de arranque de la fase 2 de ASP, conllevando potencialmente a una divulgación de información",
      },
   ],
   id: "CVE-2021-26361",
   lastModified: "2024-11-21T05:56:12.447",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-12T18:16:53.147",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.",
      },
      {
         lang: "es",
         value: "El desbordamiento de Pool/Pila en AMD Graphics Driver para Windows 10 en el escape 0x110037 puede conllevar a una escalada de privilegios, una divulgación de información o una denegación de servicio",
      },
   ],
   id: "CVE-2020-12895",
   lastModified: "2024-11-21T05:00:30.937",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T16:15:09.077",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 19:15
Modified
2024-11-21 05:00
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
      },
      {
         lang: "es",
         value: "Un desbordamiento del búfer de pila en AMD Graphics Driver para Windows 10 puede conllevar a una escalada de privilegios o una denegación de servicio",
      },
   ],
   id: "CVE-2020-12898",
   lastModified: "2024-11-21T05:00:31.200",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T19:15:07.233",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de escritura arbitraria en AMD Radeon Graphics Driver para Windows 10 permite potencialmente a usuarios no privilegiados conseguir una escalada de privilegios y causar una denegación de servicio",
      },
   ],
   id: "CVE-2020-12900",
   lastModified: "2024-11-21T05:00:31.463",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T16:15:09.230",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-05-12 19:15
Modified
2024-11-21 05:56
Summary
Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.
Impacted products
Vendor Product Version
amd radeon_software -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_5300g_firmware -
amd ryzen_5300g -
amd ryzen_5300ge_firmware -
amd ryzen_5300ge -
amd ryzen_5600g_firmware -
amd ryzen_5600g -
amd ryzen_5600ge_firmware -
amd ryzen_5600ge -
amd ryzen_5600x_firmware -
amd ryzen_5600x -
amd ryzen_5700g_firmware -
amd ryzen_5700g -
amd ryzen_5700ge_firmware -
amd ryzen_5700ge -
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd ryzen_5800x_firmware -
amd ryzen_5800x -
amd ryzen_5800x3d_firmware -
amd ryzen_5800x3d -
amd ryzen_5900x_firmware -
amd ryzen_5900x -
amd ryzen_5950x_firmware -
amd ryzen_5950x -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_threadripper_2920x_firmware -
amd ryzen_threadripper_2920x -
amd ryzen_threadripper_2950x_firmware -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2970wx_firmware -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2990wx_firmware -
amd ryzen_threadripper_2990wx -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -
amd ryzen_3_3300g_firmware -
amd ryzen_3_3300g -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_5_3450g_firmware -
amd ryzen_5_3450g -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "833B79C9-7F23-4CDB-8B9B-3699E43B9AE4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D857EFE-B24E-4228-BB1E-34F9BC763A11",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5300ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74FA8650-B46B-4034-85DA-AC568B517D37",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6CC472B-1502-402D-B2AC-8A63A69F2A27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5600g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F2BF6E-E3B0-456D-ABC1-A8687C6E8CA3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8937FABB-B60E-4780-BB6D-B1B99DD69219",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5600ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D32F62EA-D89E-4F30-8ABA-4887EC82EEF6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58F07C72-3C8F-493D-A94E-4FEDD43936D2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A60E8FD3-F6E4-42FB-96C3-B07D597560AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B93E2C9E-66AA-433B-ADB8-A6AD4F0C9A80",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA1A9BEC-27AB-40AD-BBED-4420451D3793",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F810170-5792-4C69-9D0A-DC9422CB3D90",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6678421F-CD05-445F-B114-293609732777",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34D0CF3A-54CC-42A0-9075-6923EB3023A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48F6B331-4C0F-49FF-A39F-381B9ADE3483",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5800x3d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "888D3667-BBD7-45E5-BA38-37D0A007408D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "238EA54F-4809-4D8F-9F18-71135FED9D05",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E11988B-5467-4585-9A95-AD3C7E0480F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "050C802C-D8C7-4D58-BA6E-AC48EEF25215",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7522E8A-74E4-42D8-9B6C-DD1FB6C4CE65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27CDB416-B093-4871-8142-1D7EB5BF90B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5454A72B-76EC-46D9-8675-97DC076D7615",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54611A05-BCA3-495A-8CDB-946FF47E0333",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CC4654E-519B-4412-B551-F2436108152B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBA86063-6EE8-446E-BCE1-210B0699103B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B75781D-051F-44C1-B79F-1C32AFECFF65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D7F33C-F522-4A20-9055-1662178D7F27",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2093BCDB-70F3-4D90-B899-B2801F8A6059",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AC4BECA-6023-4225-9685-937E47C67C1F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94AB5202-A5A2-479E-B4B0-347C823201AD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.",
      },
      {
         lang: "es",
         value: "Una falta de verificación del protocolo en el SMM podría permitir a un atacante controlar el protocolo y modificar la flash SPI, resultando en una potencial ejecución de código arbitrario",
      },
   ],
   id: "CVE-2021-26317",
   lastModified: "2024-11-21T05:56:05.107",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-05-12T19:15:48.070",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "00350248-7850-480A-BACF-89DC9194F34E",
                     versionEndExcluding: "21.4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).",
      },
      {
         lang: "es",
         value: "AMD Graphics Driver para Windows 10, amdfender.sys puede manejar incorrectamente la comprobación de entrada en InputBuffer, lo que puede resultar en una denegación de servicio (DoS)",
      },
   ],
   id: "CVE-2020-12960",
   lastModified: "2024-11-21T05:00:35.200",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T20:15:19.697",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.",
      },
      {
         lang: "es",
         value: "Una escalada de privilegios por Disminución Arbitraria en AMD Graphics Driver para Windows 10 puede conllevar a una escalada de privilegios o una denegación de servicio",
      },
   ],
   id: "CVE-2020-12902",
   lastModified: "2024-11-21T05:00:31.750",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T16:15:09.280",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:41
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
Impacted products
Vendor Product Version
amd radeon_software *
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_gre -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_software *
amd radeon_pro_w6300 -
amd radeon_pro_w6400 -
amd radeon_pro_w6600 -
amd radeon_pro_w6800 -
amd ryzen_9_5980hx_firmware *
amd ryzen_9_5980hx -
amd ryzen_3_3300u_firmware *
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware *
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware *
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware *
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware *
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware *
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware *
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware *
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware *
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware *
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware *
amd ryzen_7_3780u -
amd athlon_gold_3150c_firmware *
amd athlon_gold_3150c -
amd athlon_gold_3150u_firmware *
amd athlon_gold_3150u -
amd athlon_pro_3145b_firmware *
amd athlon_pro_3145b -
amd athlon_silver_3050c_firmware *
amd athlon_silver_3050c -
amd athlon_silver_3050u_firmware *
amd athlon_silver_3050u -
amd athlon_pro_3045b_firmware *
amd athlon_pro_3045b -
amd athlon_silver_3050e_firmware *
amd athlon_silver_3050e -
amd athlon_gold_pro_3150g_firmware *
amd athlon_gold_pro_3150g -
amd athlon_gold_3150g_firmware *
amd athlon_gold_3150g -
amd athlon_gold_pro_3150ge_firmware *
amd athlon_gold_pro_3150ge -
amd athlon_pro_300ge_firmware *
amd athlon_pro_300ge -
amd ryzen_3_4300ge_firmware *
amd ryzen_3_4300ge -
amd ryzen_5_4600ge_firmware *
amd ryzen_5_4600ge -
amd ryzen_7_4700ge_firmware *
amd ryzen_7_4700ge -
amd ryzen_3_4300g_firmware *
amd ryzen_3_4300g -
amd ryzen_5_4600g_firmware *
amd ryzen_5_4600g -
amd ryzen_7_4700g_firmware *
amd ryzen_7_4700g -
amd ryzen_3_5300ge_firmware *
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware *
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware *
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware *
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware *
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware *
amd ryzen_7_5700g -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "F71B3286-B679-4DC0-BDD1-784AC5577094",
                     versionEndExcluding: "23.12.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49540C5D-CEC7-4BCB-882B-73843CAFD55A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "4397FD7C-3357-4F01-98F4-131000D23AA0",
                     versionEndIncluding: "23.q4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1EFDD49-95E7-4E92-A476-9F7E9D2B222A",
                     versionEndExcluding: "cezannepi-fp6_1.0.0.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9921AE2D-F497-47C8-B463-947E230CF4F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "799912F4-2A5D-41F6-B645-5972B966617B",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2452A625-5B59-49DF-A3C3-872642181E9D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D7DEDAC-51F3-4B72-8958-72CFDB8572A0",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "533144EB-802F-496D-8C09-15AEA537F89B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B16B55B-11B3-43DB-860A-62CD3020B536",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "15FE9FAE-DEC6-42FA-8622-3D5B0C845928",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8C6F103-30CC-4738-B489-B12790836B1A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3770F180-FB7C-410F-B49D-D30AA05326BC",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE2EC993-8A65-416B-939F-1C707D596AF9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF809F01-E6B3-4975-AC8B-EE2FDD199B14",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "228E3FBD-F997-402D-AE96-B14D66390700",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F2AC7D6-47AB-4178-9585-34293B36F576",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E11A9D-03EC-4014-BB1C-5286C694581B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C05D78A9-2CED-4BA1-8382-BC8D722E91D9",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8233A5D0-7796-4164-99CF-BB23B74563DF",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "03194384-10A2-4B6D-BED1-C01908249969",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CFF28BE-F049-4716-AADE-643FABB753A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "03BCFD6B-04D1-4A27-AB06-90F8BA894E2C",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "754DE9E2-F441-4D7F-BDAB-6ADED0F9D76A",
                     versionEndExcluding: "picassopi-fp5_1.0.0.e",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "951CA892-BAE2-46A4-BC86-0A205A4FA218",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A192415A-41F1-4DF9-A351-A6E879E45431",
                     versionEndExcluding: "comboam4pi_1.0.0.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE0FB0AF-E942-4257-A9F2-8077A753A169",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F10B69-9959-4977-893B-076BFBAC1BA6",
                     versionEndExcluding: "comboam4pi_1.0.0.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7217BA72-D101-49C1-86B7-A63BFA01A056",
                     versionEndExcluding: "comboam4pi_1.0.0.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E09DC414-96EE-478E-847C-7ACB5915659B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "045D34B9-50A3-453D-A9E1-64180D1E1B5C",
                     versionEndExcluding: "comboam4pi_1.0.0.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C52E5C9A-DC2E-428F-97CF-61C7340C0579",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "62AB8A11-9C17-4528-A582-8340964C76A7",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E240139-34E9-4D68-AEBB-6E641C75AB82",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B184CA4-DA2E-4EF7-997C-BA563CB41A08",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "40EDD65C-1101-4F0C-AD08-007A97D7184E",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DCE8037-1ED8-468A-9FBF-B79809A8089A",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2201670-E611-4C1E-BD06-E2B4262C3687",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B0598FA-5EB7-41FF-AC46-BFBCE1EA1271",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C51F223-5529-4D10-A7AF-44198DE58684",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35C8C0CE-AA13-434D-83BD-2DA454B1937C",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5A8225E-A53A-4602-ACF6-F142D1CCF9FD",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF3486C1-EAD5-4861-8463-506D59A5F7DA",
                     versionEndExcluding: "comboam4v2_pi_1.2.0.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.",
      },
      {
         lang: "es",
         value: "Un atacante malicioso en x86 puede configurar mal las regiones de memoria confiable (TMR), lo que puede permitirle establecer un rango de direcciones arbitrario para la TMR, lo que podría provocar una pérdida de integridad y disponibilidad.",
      },
   ],
   id: "CVE-2021-26367",
   lastModified: "2024-12-12T20:41:56.120",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.5,
            impactScore: 5.2,
            source: "psirt@amd.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-08-13T17:15:17.360",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html",
      },
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
                     matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
                     versionEndExcluding: "21.q1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
                     versionEndExcluding: "20.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
                     matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
                     matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de divulgación de  información de dirección de grupo de kernel/fuga de pila en el controlador de gráficos AMD para Windows 10 puede conllevar a una omisión de KASLR",
      },
   ],
   id: "CVE-2020-12987",
   lastModified: "2024-11-21T05:00:37.227",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-11T22:15:11.570",
   references: [
      {
         source: "psirt@amd.com",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
                     versionEndExcluding: "20.11.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.",
      },
      {
         lang: "es",
         value: "Una lectura fuera de límites en AMD Graphics Driver for Windows 10 en Escape 0x3004203 puede conllevar a una divulgación de información arbitraria",
      },
   ],
   id: "CVE-2020-12904",
   lastModified: "2024-11-21T05:00:32.063",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-15T16:15:09.330",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
Impacted products
Vendor Product Version
intel radeon_rx_vega_m_firmware *
intel core_i5-8305g -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel nuc_8_enthusiast_nuc8i7hnkqc -
intel nuc_8_enthusiast_nuc8i7hvkva -
intel nuc_8_enthusiast_nuc8i7hvkvaw -
intel nuc_kit_nuc8i7hnk -
intel nuc_kit_nuc8i7hvk -
amd radeon_software *
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_7600 -
amd radeon_rx_7600m -
amd radeon_rx_7600m_xt -
amd radeon_rx_7600s -
amd radeon_rx_7700_xt -
amd radeon_rx_7700s -
amd radeon_rx_7800_xt -
amd radeon_rx_7900_gre -
amd radeon_rx_7900_xt -
amd radeon_rx_7900_xtx -
amd radeon_rx_7900m -
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300 -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_pro_w7500 -
amd radeon_pro_w7600 -
amd radeon_pro_w7800 -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd radeon_pro_vega_56_firmware -
amd radeon_pro_vega_56 -
amd radeon_pro_vega_64_firmware -
amd radeon_pro_vega_64 -
amd radeon_software *
amd radeon_software *
amd ryzen_3_3015ce -
amd ryzen_3_3015e -
amd ryzen_3_4100 -
amd ryzen_3_4300g -
amd ryzen_3_4300ge -
amd ryzen_3_4300u -
amd ryzen_3_5300g -
amd ryzen_3_5300ge -
amd ryzen_3_5300u -
amd ryzen_5_4500 -
amd ryzen_5_4500u -
amd ryzen_5_4600g -
amd ryzen_5_4600ge -
amd ryzen_5_4600h -
amd ryzen_5_4600hs -
amd ryzen_5_4600u -
amd ryzen_5_4680u -
amd ryzen_5_5500h -
amd ryzen_5_5500u -
amd ryzen_5_5600g -
amd ryzen_5_5600ge -
amd ryzen_5_pro_3200g -
amd ryzen_5_pro_3200ge -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3400g -
amd ryzen_5_pro_3400ge -
amd ryzen_7_4700g -
amd ryzen_7_4700ge -
amd ryzen_7_4700u -
amd ryzen_7_4800h -
amd ryzen_7_4800hs -
amd ryzen_7_4980u -
amd ryzen_7_5700g -
amd ryzen_7_5700ge -
amd ryzen_7_5700u -
amd ryzen_9_4900h -
amd ryzen_9_4900hs -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4",
                     versionEndExcluding: "23.10.01.46",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4D55B9D-4BAB-4082-A33F-626E15229333",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08718840-D468-4E86-8FFF-A2B1841E6BF6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1A4CCCB-01CC-4488-9336-C0C379ABE609",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2C17AD1-F813-484D-AC73-4A9BBCE233BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C95A2886-F2CC-45A3-8877-AE894FF86898",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "244CD6EC-780A-405E-8CFA-666A666FF7D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D391590-652D-4B98-89F1-9F31F479448B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135",
                     versionEndExcluding: "23.7.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467",
                     versionEndExcluding: "23.q3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52880029-7A09-47F5-84B9-7A8A77D883F7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40A38A14-D45C-4746-BCDC-D26D178B1426",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D89E1B8-509D-428E-984C-E23D808A0006",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
                     matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135",
                     versionEndExcluding: "23.7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
                     matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467",
                     versionEndExcluding: "23.q3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7774C021-B18A-473A-90B5-48A95071E5BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "263E53BD-7A57-40AC-8A35-D761BD3895A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E02A9C95-DF12-4816-88C3-6AFC331B8426",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDA92163-5A72-4271-89D4-401C24950F62",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "510FB098-A28C-46AD-9244-438DC828A007",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "954500F1-6466-4A1C-8E0C-D759121CEBDC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73A4079E-01E9-4807-A293-F6E843752554",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D111819-345A-4BAF-83D0-1153209AFCEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D70D28B-809E-456C-96ED-84A4CA7EC942",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C5F418C-2989-44C0-A880-A7BBA067E581",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n",
      },
      {
         lang: "es",
         value: "La verificación inadecuada de la firma del controlador RadeonTM RX Vega M Graphics para Windows puede permitir que un atacante con privilegios de administrador inicie AMDSoftwareInstaller.exe sin validar la firma del archivo, lo que podría provocar la ejecución de código arbitrario.",
      },
   ],
   id: "CVE-2023-20567",
   lastModified: "2024-11-21T07:41:08.253",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T19:15:15.880",
   references: [
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
      },
      {
         source: "psirt@amd.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html",
      },
   ],
   sourceIdentifier: "psirt@amd.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-347",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}