Vulnerabilites related to amd - radeon_software
cve-2020-12983
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-17 02:57
Severity ?
EPSS score ?
Summary
An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.208Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:17:05", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12983", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12983", datePublished: "2021-06-11T21:49:54.656844Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T02:57:33.983Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12987
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-17 01:02
Severity ?
EPSS score ?
Summary
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.199Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:17:38", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12987", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12987", datePublished: "2021-06-11T21:50:16.210991Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T01:02:07.506Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26363
Vulnerability from cvelistv5
Published
2022-05-12 18:39
Modified
2024-09-17 02:21
Severity ?
EPSS score ?
Summary
A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:24.452Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Ryzen™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { product: "Athlon™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2022-05-10T00:00:00", descriptions: [ { lang: "en", value: "A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.", }, ], problemTypes: [ { descriptions: [ { description: "tbd", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-12T18:39:33", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2022-05-10T20:00:00.000Z", ID: "CVE-2021-26363", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Ryzen™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, { product_name: "Athlon™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "tbd", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], }, source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26363", datePublished: "2022-05-12T18:39:33.159439Z", dateReserved: "2021-01-29T00:00:00", dateUpdated: "2024-09-17T02:21:07.904Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12905
Vulnerability from cvelistv5
Published
2021-11-15 19:40
Modified
2024-09-17 00:36
Severity ?
EPSS score ?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.090Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T19:40:02", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12905", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12905", datePublished: "2021-11-15T19:40:02.588599Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T00:36:22.821Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-46748
Vulnerability from cvelistv5
Published
2023-11-14 18:50
Modified
2024-08-04 05:17
Severity ?
EPSS score ?
Summary
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T05:17:42.605Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "AMD Software: Adrenalin Edition 23.7.1 ", platforms: [ "x86", ], product: "Radeon™ RX 5000/6000/7000 Series Graphics Cards ", vendor: " AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "AMD Software: PRO Edition 23.Q3 ", platforms: [ "x86", ], product: "Radeon™ PRO W5000/W6000/W7000 Series Graphics Cards", vendor: " AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", platforms: [ "x86", ], product: "Radeon™ RX Vega Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", platforms: [ "x86", ], product: "Radeon™ PRO WX Vega Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n<br>", }, ], value: "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-11-14T18:50:52.470Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, ], source: { advisory: "AMD-SB-6003", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-46748", datePublished: "2023-11-14T18:50:52.470Z", dateReserved: "2022-03-31T16:50:27.865Z", dateUpdated: "2024-08-04T05:17:42.605Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12982
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-17 00:16
Severity ?
EPSS score ?
Summary
An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.962Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:16:44", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12982", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12982", datePublished: "2021-06-11T21:49:49.547155Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T00:16:16.729Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26362
Vulnerability from cvelistv5
Published
2022-05-12 17:43
Modified
2024-09-16 19:41
Severity ?
EPSS score ?
Summary
A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:24.904Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Ryzen™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { product: "Athlon™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2022-05-10T00:00:00", descriptions: [ { lang: "en", value: "A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.", }, ], problemTypes: [ { descriptions: [ { description: "tbd", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-12T17:43:15", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2022-05-10T20:00:00.000Z", ID: "CVE-2021-26362", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Ryzen™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, { product_name: "Athlon™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "tbd", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], }, source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26362", datePublished: "2022-05-12T17:43:15.598731Z", dateReserved: "2021-01-29T00:00:00", dateUpdated: "2024-09-16T19:41:16.010Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-31320
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 14:53
Severity ?
EPSS score ?
Summary
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T14:53:30.757Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "AMD Software: Adrenalin Edition 23.7.1 ", platforms: [ "x86", ], product: "Radeon™ RX 5000/6000/7000 Series Graphics Cards ", vendor: " AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "AMD Software: PRO Edition 23.Q3 ", platforms: [ "x86", ], product: "Radeon™ PRO W5000/W6000/W7000 Series Graphics Cards", vendor: " AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", platforms: [ "x86", ], product: "Radeon™ RX Vega Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", platforms: [ "x86", ], product: "Radeon™ PRO WX Vega Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n<br>", }, ], value: "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-11-14T18:51:43.415Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, ], source: { advisory: "AMD-SB-6003", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-31320", datePublished: "2023-11-14T18:51:43.415Z", dateReserved: "2023-04-27T15:25:41.423Z", dateUpdated: "2024-08-02T14:53:30.757Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12892
Vulnerability from cvelistv5
Published
2021-11-15 18:39
Modified
2024-09-16 17:34
Severity ?
EPSS score ?
Summary
An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 21.3.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.033Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "21.3.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:14:38", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12892", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "21.3.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12892", datePublished: "2021-11-15T18:39:47.290631Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T17:34:18.633Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26391
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 17:33
Severity ?
EPSS score ?
Summary
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:25.325Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon RX 5000 Series & PRO W5000 Series", vendor: "AMD", versions: [ { lessThan: "22.5.2", status: "affected", version: "AMD Radeon Software", versionType: "custom", }, { lessThan: "22.Q2", status: "affected", version: "AMD Radeon Pro Software Enterprise", versionType: "custom", }, { lessThan: "22.10.20", status: "affected", version: "Enterprise Driver", versionType: "custom", }, ], }, { product: "AMD Radeon RX 6000 Series & PRO W6000 Series", vendor: "AMD", versions: [ { lessThan: "22.5.2", status: "affected", version: "AMD Radeon Software", versionType: "custom", }, { lessThan: "22.Q2", status: "affected", version: "AMD Radeon Pro Software Enterprise", versionType: "custom", }, { lessThan: "22.10.20", status: "affected", version: "Enterprise Driver", versionType: "custom", }, ], }, ], datePublic: "2022-11-08T00:00:00", descriptions: [ { lang: "en", value: "Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.", }, ], problemTypes: [ { descriptions: [ { description: "TBD", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-09T00:00:00", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, ], source: { advisory: "AMD-SB-1029", discovery: "EXTERNAL", }, x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26391", datePublished: "2022-11-09T20:44:25.253369Z", dateReserved: "2021-01-29T00:00:00", dateUpdated: "2024-09-16T17:33:16.199Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12930
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-17 00:00
Severity ?
EPSS score ?
Summary
Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.208Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "AMD Radeon RX 5000 Series & PRO W5000 Series", vendor: "AMD", versions: [ { lessThan: "22.5.2", status: "affected", version: "AMD Radeon Software", versionType: "custom", }, { lessThan: "22.Q2", status: "affected", version: "AMD Radeon Pro Software Enterprise", versionType: "custom", }, { lessThan: "22.10.20", status: "affected", version: "Enterprise Driver", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen(TM) Embedded R1000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen(TM) Embedded R2000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen(TM) Embedded 5000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen(TM) Embedded V1000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen(TM) Embedded V2000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2022-11-08T05:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.</p>", }, ], value: "Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.", }, ], providerMetadata: { dateUpdated: "2024-02-13T19:20:09.393Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], source: { advisory: "AMD-SB-1029, AMD-SB-5001", discovery: "EXTERNAL", }, x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12930", datePublished: "2022-11-09T20:44:25.791003Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T00:00:30.267Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12986
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-16 16:58
Severity ?
EPSS score ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.187Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:17:26", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12986", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12986", datePublished: "2021-06-11T21:50:10.654582Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T16:58:08.554Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20586
Vulnerability from cvelistv5
Published
2023-08-08 17:05
Modified
2024-10-11 16:52
Severity ?
EPSS score ?
Summary
A potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | Radeon™ Software Crimson ReLive Edition |
Version: Various |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:36.256Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-20586", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-11T16:52:02.725525Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-11T16:52:31.173Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", platforms: [ "x86", ], product: "Radeon™ Software Crimson ReLive Edition", vendor: "AMD", versions: [ { status: "affected", version: "Various ", }, ], }, ], datePublic: "2023-08-08T16:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(248, 249, 250);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">A potential vulnerability was reported in </span><span style=\"background-color: rgb(255, 255, 255);\">Radeon™ Software Crimson ReLive Edition</span><span style=\"background-color: rgb(255, 255, 255);\"> which may allow escalation of privilege. </span><span style=\"background-color: rgb(255, 255, 255);\">Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations</span>\n\n\n\n\n\n</span>\n\n\n\n\n\n\n\n\n\n", }, ], value: "\nA potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-08-08T17:05:16.338Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007", }, ], source: { advisory: "AMD-SB-6007", discovery: "UNKNOWN", }, title: "Radeon™ Software Crimson ReLive Edition", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20586", datePublished: "2023-08-08T17:05:16.338Z", dateReserved: "2022-10-27T18:53:39.759Z", dateUpdated: "2024-10-11T16:52:31.173Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26360
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 22:56
Severity ?
EPSS score ?
Summary
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon RX 6000 Series & PRO W6000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:25.015Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon RX 6000 Series & PRO W6000 Series", vendor: "AMD", versions: [ { lessThan: "22.5.2", status: "affected", version: "AMD Radeon Software", versionType: "custom", }, { lessThan: "22.Q2", status: "affected", version: "AMD Radeon Pro Software Enterprise", versionType: "custom", }, { lessThan: "22.10.20", status: "affected", version: "Enterprise Driver", versionType: "custom", }, ], }, ], datePublic: "2022-11-08T00:00:00", descriptions: [ { lang: "en", value: "An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.", }, ], problemTypes: [ { descriptions: [ { description: "TBD", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-11-09T00:00:00", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, ], source: { advisory: "AMD-SB-1029", discovery: "EXTERNAL", }, x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26360", datePublished: "2022-11-09T20:44:26.034287Z", dateReserved: "2021-01-29T00:00:00", dateUpdated: "2024-09-16T22:56:17.356Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12895
Vulnerability from cvelistv5
Published
2021-11-15 15:56
Modified
2024-09-16 22:02
Severity ?
EPSS score ?
Summary
Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.755Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:14:44", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12895", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12895", datePublished: "2021-11-15T15:56:00.755364Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T22:02:20.505Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26369
Vulnerability from cvelistv5
Published
2022-05-12 17:07
Modified
2024-09-16 19:51
Severity ?
EPSS score ?
Summary
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:24.431Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Ryzen™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { product: "Athlon™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2022-05-10T00:00:00", descriptions: [ { lang: "en", value: "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.", }, ], problemTypes: [ { descriptions: [ { description: "tbd", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-12T17:07:32", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2022-05-10T20:00:00.000Z", ID: "CVE-2021-26369", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Ryzen™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, { product_name: "Athlon™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "tbd", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], }, source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26369", datePublished: "2022-05-12T17:07:32.274198Z", dateReserved: "2021-01-29T00:00:00", dateUpdated: "2024-09-16T19:51:13.979Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26367
Vulnerability from cvelistv5
Published
2024-08-13 16:50
Modified
2024-12-04 16:25
Severity ?
EPSS score ?
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
References
Impacted products
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2021-26367", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-13T18:04:31.680686Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-12-04T16:25:09.987Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "ComboAM4v2 PI 1.2.0.5", }, ], }, { defaultStatus: "affected", product: "AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "ComboAM4PI 1.0.0.9", }, { status: "unaffected", version: "ComboAM4v2 PI 1.2.0.8", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "ComboAM4v2 PI 1.2.0.5", }, ], }, { defaultStatus: "affected", product: "AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "PicassoPI-FP5 1.0.0.E", }, ], }, { defaultStatus: "affected", product: "AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "PollockPI-FT5 1.0.0.4", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "PicassoPI-FP5 1.0.0.E", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "RenoirPI-FP6 1.0.0.7", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "CezannePI-FP6 1.0.0.6", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "CezannePI-FP6 1.0.0.6", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "CezannePI-FP6 1.0.0.6", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "CezannePI-FP6 1.0.0.6", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "unaffected", version: "CezannePI-FP6 1.0.0.6", }, ], }, { defaultStatus: "affected", product: "AMD Radeon™ RX 6000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "unaffected", version: "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)", }, ], }, { defaultStatus: "affected", product: "AMD Radeon™ PRO W6000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "unaffected", version: "AMD Software: PRO Edition 23.Q4 (23.30.13.03)", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ Embedded R1000 Series Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbeddedPI-FP5 1.2.0.A", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ Embedded R2000 Series Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbeddedR2KPI-FP5 1.0.0.2", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ Embedded V1000 Series Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbeddedPI-FP5 1.2.0.A", }, ], }, { defaultStatus: "affected", product: "AMD Ryzen™ Embedded V2000 Series Processors", vendor: "AMD", versions: [ { status: "unaffected", version: "EmbeddedPI-FP6 1.0.0.6", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.", }, ], value: "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.7, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-13T16:50:05.825Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html", }, { url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26367", datePublished: "2024-08-13T16:50:05.825Z", dateReserved: "2021-01-29T21:24:26.151Z", dateUpdated: "2024-12-04T16:25:09.987Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12894
Vulnerability from cvelistv5
Published
2021-11-15 19:48
Modified
2024-09-17 01:45
Severity ?
EPSS score ?
Summary
Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.130Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T19:48:37", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12894", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12894", datePublished: "2021-11-15T19:48:37.220384Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T01:45:55.094Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12899
Vulnerability from cvelistv5
Published
2021-11-15 15:29
Modified
2024-09-16 18:44
Severity ?
EPSS score ?
Summary
Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.946Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T15:29:56", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12899", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12899", datePublished: "2021-11-15T15:29:56.401647Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T18:44:07.969Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12962
Vulnerability from cvelistv5
Published
2021-11-15 19:42
Modified
2024-09-16 22:09
Severity ?
EPSS score ?
Summary
Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.192Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T19:42:43", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12962", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12962", datePublished: "2021-11-15T19:42:43.185696Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T22:09:11.342Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20510
Vulnerability from cvelistv5
Published
2024-08-13 16:52
Modified
2024-11-21 15:32
Severity ?
EPSS score ?
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon™ RX 6000 Series Graphics Cards | |||||
|
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-20510", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-13T18:03:49.594825Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-21T15:32:34.695Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "AMD Radeon™ RX 6000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "unaffected", version: "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)", }, ], }, { defaultStatus: "affected", product: "AMD Radeon™ PRO W6000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "unaffected", version: "AMD Software: PRO Edition 23.Q4 (23.30.13.03)", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.", }, ], value: "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-13T16:52:11.777Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20510", datePublished: "2024-08-13T16:52:11.777Z", dateReserved: "2022-10-27T18:53:39.735Z", dateUpdated: "2024-11-21T15:32:34.695Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26317
Vulnerability from cvelistv5
Published
2022-05-12 18:27
Modified
2024-09-17 01:10
Severity ?
EPSS score ?
Summary
Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:19:20.472Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Ryzen™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { product: "Athlon™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2022-05-10T00:00:00", descriptions: [ { lang: "en", value: "Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.", }, ], problemTypes: [ { descriptions: [ { description: "tbd", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-12T18:27:48", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2022-05-10T20:00:00.000Z", ID: "CVE-2021-26317", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Ryzen™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, { product_name: "Athlon™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "tbd", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], }, source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26317", datePublished: "2022-05-12T18:27:48.589066Z", dateReserved: "2021-01-29T00:00:00", dateUpdated: "2024-09-17T01:10:36.785Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12900
Vulnerability from cvelistv5
Published
2021-11-15 15:27
Modified
2024-09-17 02:21
Severity ?
EPSS score ?
Summary
An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.394Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T15:27:51", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12900", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12900", datePublished: "2021-11-15T15:27:51.589901Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T02:21:18.348Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12904
Vulnerability from cvelistv5
Published
2021-11-15 15:12
Modified
2024-09-16 16:38
Severity ?
EPSS score ?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.111Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T15:12:44", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12904", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12904", datePublished: "2021-11-15T15:12:44.714023Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T16:38:11.800Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12960
Vulnerability from cvelistv5
Published
2021-11-15 19:47
Modified
2024-09-17 03:53
Severity ?
EPSS score ?
Summary
AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 21.4.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.103Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "21.4.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T19:47:19", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12960", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "21.4.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12960", datePublished: "2021-11-15T19:47:19.313108Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T03:53:03.583Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12985
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-16 17:23
Severity ?
EPSS score ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.044Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:16:33", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12985", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12985", datePublished: "2021-06-11T21:50:05.196288Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T17:23:19.728Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20598
Vulnerability from cvelistv5
Published
2023-10-17 13:26
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000 Series Graphics Cards |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "radeon_rx_5300_xt", vendor: "amd", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_5_7645hx", vendor: "amd", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_9_pro_7945", vendor: "amd", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-20598", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-06-27T17:12:05.139002Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-269", description: "CWE-269 Improper Privilege Management", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-06-27T17:12:23.788Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T09:05:36.253Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Radeon™ RX 5000 Series Graphics Cards", vendor: " AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Radeon™ RX 6000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Radeon™ RX 7000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Radeon™ PRO W5000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "Various ", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Radeon™ PRO W6000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Radeon™ PRO W7000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Ryzen™ 7045 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: " Ryzen™ 7020 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Ryzen™ 7040 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Ryzen™ 7000 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Ryzen™ 6000 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "affected", platforms: [ "Windows", "x86", ], product: "Ryzen™ 7035 Series Processors with Radeon™ Graphics", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-10-16T17:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "\n\n\n\n<span style=\"background-color: rgb(248, 249, 250);\">An improper privilege management in the AMD Radeon™</span> <span style=\"background-color: rgb(248, 249, 250);\">Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.</span>\n\n\n\n", }, ], value: "\n\n\nAn improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-10-17T13:26:21.731Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009", }, ], source: { advisory: " AMD-SB-6009", discovery: "EXTERNAL", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20598", datePublished: "2023-10-17T13:26:21.731Z", dateReserved: "2022-10-27T18:53:39.763Z", dateUpdated: "2024-08-02T09:05:36.253Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26366
Vulnerability from cvelistv5
Published
2022-05-12 17:09
Modified
2024-09-17 01:51
Severity ?
EPSS score ?
Summary
An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:25.139Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Ryzen™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { product: "Athlon™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2022-05-10T00:00:00", descriptions: [ { lang: "en", value: "An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.", }, ], problemTypes: [ { descriptions: [ { description: "tbd", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-12T17:09:29", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2022-05-10T20:00:00.000Z", ID: "CVE-2021-26366", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Ryzen™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, { product_name: "Athlon™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "tbd", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], }, source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26366", datePublished: "2022-05-12T17:09:29.825927Z", dateReserved: "2021-01-29T00:00:00", dateUpdated: "2024-09-17T01:51:13.541Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26392
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 20:51
Severity ?
EPSS score ?
Summary
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:25.366Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "AMD Radeon RX 5000 Series & PRO W5000 Series", vendor: "AMD", versions: [ { lessThan: "22.5.2", status: "affected", version: "AMD Radeon Software", versionType: "custom", }, { lessThan: "22.Q2", status: "affected", version: "AMD Radeon Pro Software Enterprise", versionType: "custom", }, { lessThan: "22.10.20", status: "affected", version: "Enterprise Driver", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "AMD Radeon RX 6000 Series & PRO W6000 Series", vendor: "AMD", versions: [ { lessThan: "22.5.2", status: "affected", version: "AMD Radeon Software", versionType: "custom", }, { lessThan: "22.Q2", status: "affected", version: "AMD Radeon Pro Software Enterprise", versionType: "custom", }, { lessThan: "22.10.20", status: "affected", version: "Enterprise Driver", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded R1000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded R2000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded 5000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded V1000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded V2000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™Embedded V3000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2022-11-08T05:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.</p>", }, ], value: "Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.", }, ], providerMetadata: { dateUpdated: "2024-02-13T19:22:08.137Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], source: { advisory: "AMD-SB-1029, AMD-SB-5001", discovery: "EXTERNAL", }, x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26392", datePublished: "2022-11-09T20:44:26.258839Z", dateReserved: "2021-01-29T00:00:00", dateUpdated: "2024-09-16T20:51:46.791Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26361
Vulnerability from cvelistv5
Published
2022-05-12 17:46
Modified
2024-09-17 01:06
Severity ?
EPSS score ?
Summary
A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ Series |
Version: various |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:24.531Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Ryzen™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { product: "Athlon™ Series", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2022-05-10T00:00:00", descriptions: [ { lang: "en", value: "A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.", }, ], problemTypes: [ { descriptions: [ { description: "tbd", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-05-12T17:46:01", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2022-05-10T20:00:00.000Z", ID: "CVE-2021-26361", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Ryzen™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, { product_name: "Athlon™ Series", version: { version_data: [ { version_affected: "=", version_value: "various", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "tbd", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], }, source: { advisory: "AMD-SB-1027", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26361", datePublished: "2022-05-12T17:46:01.990877Z", dateReserved: "2021-01-29T00:00:00", dateUpdated: "2024-09-17T01:06:56.408Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-26393
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 21:58
Severity ?
EPSS score ?
Summary
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T20:26:25.406Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "AMD Radeon RX 5000 Series & PRO W5000 Series", vendor: "AMD", versions: [ { lessThan: "22.5.2", status: "affected", version: "AMD Radeon Software", versionType: "custom", }, { lessThan: "22.Q2", status: "affected", version: "AMD Radeon Pro Software Enterprise", versionType: "custom", }, { lessThan: "22.10.20", status: "affected", version: "Enterprise Driver", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "AMD Radeon RX 6000 Series & PRO W6000 Series", vendor: "AMD", versions: [ { lessThan: "22.5.2", status: "affected", version: "AMD Radeon Software", versionType: "custom", }, { lessThan: "22.Q2", status: "affected", version: "AMD Radeon Pro Software Enterprise", versionType: "custom", }, { lessThan: "22.10.20", status: "affected", version: "Enterprise Driver", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded R1000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded R2000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded V1000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded V2000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2022-11-08T05:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.</p>", }, ], value: "Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.", }, ], providerMetadata: { dateUpdated: "2024-02-13T19:22:50.269Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], source: { advisory: "AMD-SB-1029, AMD-SB-5001", discovery: "EXTERNAL", }, x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2021-26393", datePublished: "2022-11-09T20:44:25.517806Z", dateReserved: "2021-01-29T00:00:00", dateUpdated: "2024-09-16T21:58:26.137Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12903
Vulnerability from cvelistv5
Published
2021-11-15 19:44
Modified
2024-09-17 00:52
Severity ?
EPSS score ?
Summary
Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.704Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T19:44:12", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12903", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12903", datePublished: "2021-11-15T19:44:12.722388Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T00:52:24.174Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20567
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:36.949Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "AMD Software: Adrenalin Edition 23.7.1 ", platforms: [ "x86", ], product: "Radeon™ RX 5000/6000/7000 Series Graphics Cards ", vendor: " AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "AMD Software: PRO Edition 23.Q3 ", platforms: [ "x86", ], product: "Radeon™ PRO W5000/W6000/W7000 Series Graphics Cards", vendor: " AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", platforms: [ "x86", ], product: "Radeon™ RX Vega Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", platforms: [ "x86", ], product: "Radeon™ PRO WX Vega Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n<br>", }, ], value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-11-14T18:51:25.340Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, ], source: { advisory: "AMD-SB-6003", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20567", datePublished: "2023-11-14T18:51:25.340Z", dateReserved: "2022-10-27T18:53:39.753Z", dateUpdated: "2024-08-02T09:05:36.949Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20568
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:36.255Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "AMD Software: Adrenalin Edition 23.7.1 ", platforms: [ "x86", ], product: "Radeon™ RX 5000/6000/7000 Series Graphics Cards ", vendor: " AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "AMD Software: PRO Edition 23.Q3 ", platforms: [ "x86", ], product: "Radeon™ PRO W5000/W6000/W7000 Series Graphics Cards", vendor: " AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", platforms: [ "x86", ], product: "Radeon™ RX Vega Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", platforms: [ "x86", ], product: "Radeon™ PRO WX Vega Series Graphics Cards", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n<br>", }, ], value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-11-14T18:51:35.466Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, ], source: { advisory: "AMD-SB-6003", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20568", datePublished: "2023-11-14T18:51:35.466Z", dateReserved: "2022-10-27T18:53:39.754Z", dateUpdated: "2024-08-02T09:05:36.255Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12931
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-17 00:56
Severity ?
EPSS score ?
Summary
Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.233Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { tags: [ "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "AMD Radeon RX 5000 Series & PRO W5000 Series", vendor: "AMD", versions: [ { lessThan: "22.5.2", status: "affected", version: "AMD Radeon Software", versionType: "custom", }, { lessThan: "22.Q2", status: "affected", version: "AMD Radeon Pro Software Enterprise", versionType: "custom", }, { lessThan: "22.10.20", status: "affected", version: "Enterprise Driver", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen(TM) Embedded R1000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen(TM) Embedded R2000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen(TM) Embedded 5000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen(TM) Embedded V1000", vendor: "AMD", versions: [ { status: "affected", version: "various", }, ], }, ], datePublic: "2022-11-08T05:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.</p>", }, ], value: "Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.", }, ], providerMetadata: { dateUpdated: "2024-02-13T19:20:36.423Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], source: { advisory: "AMD-SB-1029, AMD-SB-5001", discovery: "EXTERNAL", }, x_generator: { engine: "Vulnogram 0.0.9", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12931", datePublished: "2022-11-09T20:44:24.974055Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T00:56:08.624Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-21937
Vulnerability from cvelistv5
Published
2024-11-12 17:14
Modified
2024-11-14 16:26
Severity ?
EPSS score ?
Summary
Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | AMD Software: PRO Edition |
Version: 0 Version: 0 |
||||||||
|
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:amd:amd_software_pro_edition:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "amd_software_pro_edition", vendor: "amd", versions: [ { lessThan: "24.10.16", status: "affected", version: "0", versionType: "custom", }, { lessThan: "24.q2_24.10.20", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:amd:amd_software_adrenalin_edition:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "amd_software_adrenalin_edition", vendor: "amd", versions: [ { lessThan: "24.6.1_24.10.21.01", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:amd:amd_software_cloud_edition:*:*:*:*:*:*:*:*", ], defaultStatus: "unaffected", product: "amd_software_cloud_edition", vendor: "amd", versions: [ { lessThan: "24.7.1", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-21937", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-14T16:22:23.757990Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-14T16:26:04.560Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", platforms: [ "Windows", ], product: "AMD Software: PRO Edition", vendor: "AMD", versions: [ { lessThan: "24.10.16", status: "affected", version: "0", versionType: "software", }, { lessThan: "24.Q2 (24.10.20)", status: "affected", version: "0", versionType: "software", }, ], }, { defaultStatus: "unaffected", product: "AMD Software: Adrenalin Edition", vendor: "AMD", versions: [ { lessThan: "24.6.1 (24.10.21.01)", status: "affected", version: "0", versionType: "software", }, ], }, { defaultStatus: "unaffected", product: "AMD Software: Cloud Edition", vendor: "AMD", versions: [ { lessThan: "24.7.1", status: "affected", version: "0", versionType: "software", }, ], }, ], datePublic: "2024-11-12T17:00:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(248, 249, 250);\">Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.</span>", }, ], value: "Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-276", description: "CWE-276 Incorrect Default Permissions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-12T17:14:20.641Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6015.html", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2024-21937", datePublished: "2024-11-12T17:14:20.641Z", dateReserved: "2024-01-03T16:43:14.977Z", dateUpdated: "2024-11-14T16:26:04.560Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12897
Vulnerability from cvelistv5
Published
2021-11-15 15:44
Modified
2024-09-16 17:38
Severity ?
EPSS score ?
Summary
Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 21.3.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.036Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "21.3.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T15:44:11", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12897", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "21.3.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12897", datePublished: "2021-11-15T15:44:11.456371Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T17:38:45.112Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-31307
Vulnerability from cvelistv5
Published
2024-08-13 16:54
Modified
2024-12-03 16:30
Severity ?
EPSS score ?
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | AMD Radeon™ RX 6000 Series Graphics Cards | |||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2023-31307", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-08-13T18:03:11.598841Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-129", description: "CWE-129 Improper Validation of Array Index", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-12-03T16:30:08.173Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "affected", product: "AMD Radeon™ RX 6000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "unaffected", version: "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)", }, ], }, { defaultStatus: "affected", product: "AMD Radeon™ PRO W6000 Series Graphics Cards", vendor: "AMD", versions: [ { status: "unaffected", version: "AMD Software: PRO Edition 23.Q4 (23.30.13.03)", }, ], }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: " Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.", }, ], value: "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 2.3, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-13T16:54:03.514Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-31307", datePublished: "2024-08-13T16:54:03.514Z", dateReserved: "2023-04-27T15:25:41.422Z", dateUpdated: "2024-12-03T16:30:08.173Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12981
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-16 18:19
Severity ?
EPSS score ?
Summary
An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.107Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:16:55", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12981", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12981", datePublished: "2021-06-11T21:49:43.864896Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T18:19:38.577Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12920
Vulnerability from cvelistv5
Published
2021-11-15 15:50
Modified
2024-09-16 18:49
Severity ?
EPSS score ?
Summary
A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.124Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T15:50:34", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12920", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12920", datePublished: "2021-11-15T15:50:34.930613Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T18:49:42.624Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12898
Vulnerability from cvelistv5
Published
2021-11-15 18:58
Modified
2024-09-17 03:03
Severity ?
EPSS score ?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.206Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T18:58:30", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12898", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12898", datePublished: "2021-11-15T18:58:30.225747Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T03:03:38.846Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12929
Vulnerability from cvelistv5
Published
2021-11-15 15:52
Modified
2024-09-17 02:00
Severity ?
EPSS score ?
Summary
Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.216Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:14:51", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12929", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12929", datePublished: "2021-11-15T15:52:18.454932Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T02:00:49.330Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12902
Vulnerability from cvelistv5
Published
2021-11-15 15:48
Modified
2024-09-16 16:59
Severity ?
EPSS score ?
Summary
Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.204Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T15:48:41", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12902", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12902", datePublished: "2021-11-15T15:48:41.148192Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T16:59:09.552Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12891
Vulnerability from cvelistv5
Published
2022-02-04 22:29
Modified
2024-09-16 17:33
Severity ?
EPSS score ?
Summary
AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | AMD | Radeon Software |
Version: Radeon Driver < 21.4.1 |
||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.664Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Radeon Software", vendor: "AMD", versions: [ { lessThan: "21.4.1", status: "affected", version: "Radeon Driver", versionType: "custom", }, ], }, { product: "Radeon Pro Software for Enterprise", vendor: "AMD", versions: [ { lessThan: "21.Q2", status: "affected", version: "Enterprise Driver", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.", }, ], problemTypes: [ { descriptions: [ { description: "TBD", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-04T22:29:12", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:30:00.000Z", ID: "CVE-2020-12891", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Driver", version_value: "21.4.1", }, ], }, }, { product_name: "Radeon Pro Software for Enterprise", version: { version_data: [ { version_affected: "<", version_name: "Enterprise Driver", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "TBD", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12891", datePublished: "2022-02-04T22:29:12.020774Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T17:33:32.143Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12963
Vulnerability from cvelistv5
Published
2021-11-15 15:58
Modified
2024-09-16 22:45
Severity ?
EPSS score ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.216Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:14:56", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12963", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12963", datePublished: "2021-11-15T15:58:06.272723Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T22:45:17.132Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12893
Vulnerability from cvelistv5
Published
2021-11-15 19:45
Modified
2024-09-16 23:15
Severity ?
EPSS score ?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.856Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:14:45", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12893", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12893", datePublished: "2021-11-15T19:45:36.942420Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T23:15:51.176Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12901
Vulnerability from cvelistv5
Published
2021-11-15 19:20
Modified
2024-09-17 03:17
Severity ?
EPSS score ?
Summary
Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.11.2 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.064Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.11.2", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-15T19:20:07", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12901", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.11.2", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12901", datePublished: "2021-11-15T19:20:07.896631Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T03:17:36.985Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12980
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-17 03:22
Severity ?
EPSS score ?
Summary
An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:19.003Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:17:16", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12980", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12980", datePublished: "2021-06-11T21:49:38.162263Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-17T03:22:33.667Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-12964
Vulnerability from cvelistv5
Published
2021-11-15 14:51
Modified
2024-09-16 18:28
Severity ?
EPSS score ?
Summary
A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | AMD | AMD Radeon Software |
Version: Radeon Software < 20.7.1 Version: Radeon Pro Software for Enterprise < 21.Q2 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T12:11:18.701Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "AMD Radeon Software", vendor: "AMD", versions: [ { lessThan: "20.7.1", status: "affected", version: "Radeon Software", versionType: "custom", }, { lessThan: "21.Q2", status: "affected", version: "Radeon Pro Software for Enterprise", versionType: "custom", }, ], }, ], datePublic: "2021-11-09T00:00:00", descriptions: [ { lang: "en", value: "A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.", }, ], problemTypes: [ { descriptions: [ { description: "NA", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-12-27T18:14:55", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@amd.com", DATE_PUBLIC: "2021-11-09T20:00:00.000Z", ID: "CVE-2020-12964", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "AMD Radeon Software", version: { version_data: [ { version_affected: "<", version_name: "Radeon Software", version_value: "20.7.1", }, { version_affected: "<", version_name: "Radeon Pro Software for Enterprise", version_value: "21.Q2", }, ], }, }, ], }, vendor_name: "AMD", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "NA", }, ], }, ], }, references: { reference_data: [ { name: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", refsource: "MISC", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], }, source: { advisory: "AMD-SB-1000", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2020-12964", datePublished: "2021-11-15T14:51:15.631262Z", dateReserved: "2020-05-15T00:00:00", dateUpdated: "2024-09-16T18:28:27.531Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2023-08-08 18:15
Modified
2024-11-21 07:41
Severity ?
Summary
A potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:crimson_relive:*:*:*", matchCriteriaId: "1B9B57CB-1D5E-4FE9-B03D-315A9B54650A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "\nA potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", }, ], id: "CVE-2023-20586", lastModified: "2024-11-21T07:41:10.223", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-08-08T18:15:11.593", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | enterprise_driver | * | |
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | ryzen_3_2200ge_firmware | - | |
amd | ryzen_3_2200ge | - | |
amd | ryzen_3_2200g_firmware | - | |
amd | ryzen_3_2200g | - | |
amd | ryzen_5_2400ge_firmware | - | |
amd | ryzen_5_2400ge | - | |
amd | ryzen_5_2400g_firmware | - | |
amd | ryzen_5_2400g | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3900xt_firmware | - | |
amd | ryzen_9_3900xt | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_5_5500_firmware | - | |
amd | ryzen_5_5500 | - | |
amd | ryzen_5_5600_firmware | - | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_7_5700x_firmware | - | |
amd | ryzen_7_5700x | - | |
amd | ryzen_7_5800x_firmware | - | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | - | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5800x3d_firmware | - | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_9_5900_firmware | - | |
amd | ryzen_9_5900 | - | |
amd | ryzen_9_5900x_firmware | - | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5950x_firmware | - | |
amd | ryzen_9_5950x | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | athlon_silver_3050e_firmware | - | |
amd | athlon_silver_3050e | - | |
amd | athlon_pro_3045b_firmware | - | |
amd | athlon_pro_3045b | - | |
amd | athlon_silver_3050u_firmware | - | |
amd | athlon_silver_3050u | - | |
amd | athlon_silver_3050c_firmware | - | |
amd | athlon_silver_3050c | - | |
amd | athlon_pro_3145b_firmware | - | |
amd | athlon_pro_3145b | - | |
amd | athlon_gold_3150u_firmware | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_gold_3150c_firmware | - | |
amd | athlon_gold_3150c | - | |
amd | ryzen_3_3250u_firmware | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3250c_firmware | - | |
amd | ryzen_3_3250c | - | |
amd | amd_3020e_firmware | - | |
amd | amd_3020e | - | |
amd | amd_3015e_firmware | - | |
amd | amd_3015e | - | |
amd | amd_3015ce_firmware | - | |
amd | amd_3015ce | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3350u_firmware | - | |
amd | ryzen_3_3350u | - | |
amd | ryzen_5_3450u_firmware | - | |
amd | ryzen_5_3450u | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3500c_firmware | - | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700c_firmware | - | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_3_pro_3200ge_firmware | - | |
amd | ryzen_3_pro_3200ge | - | |
amd | ryzen_3_3200g_firmware | - | |
amd | ryzen_3_3200g | - | |
amd | ryzen_3_pro_3200g_firmware | - | |
amd | ryzen_3_pro_3200g | - | |
amd | ryzen_5_pro_3350ge_firmware | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3350g_firmware | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3400ge_firmware | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_5_pro_3400g_firmware | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*", matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9", versionEndExcluding: "22.10.20", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643", versionEndExcluding: "22.q2", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A", versionEndExcluding: "22.5.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E3C57977-E2BA-494F-AA3C-B460117B2996", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0D0E24-0615-4F6C-947D-CFA59D114486", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "41C3746E-6D5F-47B5-BE13-1A6DC004F79B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*", matchCriteriaId: "B682A8FF-B83F-41A5-BA22-4394EC0C4457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B38ABACD-4E5D-440C-9464-C894DB610C94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "B230F1D4-FF59-43E5-BC20-0BCD43A55683", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2503E43D-8415-4702-B7AA-22C472F4BE51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*", matchCriteriaId: "09ADB589-F43C-43A5-8CA6-B9D4D3294880", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F0E87F5-65BA-477D-9679-907FD2906298", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", matchCriteriaId: "51A56423-3DDE-451B-AC47-51715AC74F41", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "927B2661-8988-484F-965C-D94AA9D52911", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", matchCriteriaId: "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3D814C2A-D794-46A8-9A06-CC4DB387176F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", matchCriteriaId: "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4350ADE3-9A31-4A23-9B15-7A44E8F29E90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", matchCriteriaId: "7E52108F-FAAE-4075-8F87-239008E77009", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "E309B1D5-E232-4F26-BF35-25A1542A5E10", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", matchCriteriaId: "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", matchCriteriaId: "F4E68C36-118D-41F9-900E-9F38F585A34D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E654C546-AAEE-4DDA-81B4-144DD5766F9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "487D6661-ECA7-44C0-BD46-FC8C03187B85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "777D94BA-613B-49E9-B1B3-2A9E0FC35908", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", matchCriteriaId: "34045719-7683-4621-929B-5F6B16B6A580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "331E829F-D05A-4D6D-A017-A2BE0D7C3D09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE2DD3E-51C4-4E21-BC43-CE567812B59A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", matchCriteriaId: "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54611A05-BCA3-495A-8CDB-946FF47E0333", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3CC4654E-519B-4412-B551-F2436108152B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "38997E8B-D2B7-4AB2-BB6E-33966511AF38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40E3B591-EBC2-4C6A-8574-33F27F9AAE17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", matchCriteriaId: "951CA892-BAE2-46A4-BC86-0A205A4FA218", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6882B4E1-0BFF-4093-BE67-72294949C3F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", matchCriteriaId: "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", matchCriteriaId: "6CFF28BE-F049-4716-AADE-643FABB753A7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9E741A31-8265-45E0-9834-23D00D5F8176", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", matchCriteriaId: "FEE30066-A56C-4997-BED2-FEB4F61D9F09", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "07D642E6-4D91-49C3-B8BB-8B4575CE99D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", matchCriteriaId: "9E514E0C-397F-4DF3-AD79-D7C800BAA28A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "610909ED-A636-4007-A50F-500057340E70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", matchCriteriaId: "57E11A9D-03EC-4014-BB1C-5286C694581B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1902D5CE-4BBB-45F7-9D52-28AF43F460CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", matchCriteriaId: "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C29793-1142-4506-8C32-3B89227BB3A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "913A2DC9-4215-486B-BD15-3AF515E3CDCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", matchCriteriaId: "1708574D-CFD3-4CB7-9037-8B5D4070E5BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4DF8A936-58AE-44BB-897E-44782232394F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*", matchCriteriaId: "E9FC3889-3F62-48AC-876D-5A630A5E2AD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D79E460A-D34C-4120-8529-F32988793DC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*", matchCriteriaId: "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "069392FC-51DB-49F0-B30B-8ED46C694057", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*", matchCriteriaId: "A7CF1D17-05FD-4A2C-8339-C72B4BA27218", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", matchCriteriaId: "9921AE2D-F497-47C8-B463-947E230CF4F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", matchCriteriaId: "2452A625-5B59-49DF-A3C3-872642181E9D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "51D4403E-C626-4817-B0C9-ECEC420C517D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", matchCriteriaId: "533144EB-802F-496D-8C09-15AEA537F89B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DFDD574D-1799-4386-A906-705DC2F0978F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", matchCriteriaId: "DCDAE070-C41A-4D8C-BE0D-DBD434760749", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "58EE3F9B-6950-4F83-B0BE-ADA560457BC1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", matchCriteriaId: "5B16B55B-11B3-43DB-860A-62CD3020B536", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", matchCriteriaId: "A8C6F103-30CC-4738-B489-B12790836B1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2EC993-8A65-416B-939F-1C707D596AF9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0359E9DA-5BC0-48FD-962C-34358691E7DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", matchCriteriaId: "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "945182A3-1BE3-459D-BC45-5554FB905C3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", matchCriteriaId: "0C03B5C8-9337-422B-9474-08EBBD0E0A45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", matchCriteriaId: "228E3FBD-F997-402D-AE96-B14D66390700", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", matchCriteriaId: "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF105508-6252-4101-92B5-ECA9022D4720", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE83C48-571F-4BD6-ABE3-2B14ED510D13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EAFFAD03-CEE3-4C35-B6D2-627004A22934", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "926812AD-94F0-4CB8-9890-EAB11FDC1804", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9724784-3A56-4175-9829-796CF687CA09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40933267-3CEF-417E-BE95-37B562F37E78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.", }, { lang: "es", value: "Una verificación insuficiente del tamaño faltante en 'LoadModule' puede provocar una escritura fuera de límites que podría permitir que un atacante con privilegios obtenga la ejecución de código del sistema operativo/kernel cargando un TA malicioso.", }, ], id: "CVE-2021-26392", lastModified: "2024-11-21T05:56:16.773", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-09T21:15:12.360", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-10-17 14:15
Modified
2024-11-21 07:41
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre_10gb | - | |
amd | radeon_rx_6750_gre_12gb | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_7600 | - | |
amd | radeon_rx_7600m | - | |
amd | radeon_rx_7600m_xt | - | |
amd | radeon_rx_7600s | - | |
amd | radeon_rx_7700_xt | - | |
amd | radeon_rx_7700s | - | |
amd | radeon_rx_7800_xt | - | |
amd | radeon_rx_7900_gre | - | |
amd | radeon_rx_7900_xt | - | |
amd | radeon_rx_7900_xtx | - | |
amd | radeon_rx_7900m | - | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w7500 | - | |
amd | radeon_pro_w7600 | - | |
amd | radeon_pro_w7800 | - | |
amd | radeon_pro_w7900 | - | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | ryzen_3_7320u | - | |
amd | ryzen_3_7335u | - | |
amd | ryzen_3_7440u | - | |
amd | ryzen_5_6600h | - | |
amd | ryzen_5_6600hs | - | |
amd | ryzen_5_6600u | - | |
amd | ryzen_5_7500f | - | |
amd | ryzen_5_7520u | - | |
amd | ryzen_5_7535hs | - | |
amd | ryzen_5_7535u | - | |
amd | ryzen_5_7540u | - | |
amd | ryzen_5_7600 | - | |
amd | ryzen_5_7600x | - | |
amd | ryzen_5_7640h | - | |
amd | ryzen_5_7640u | - | |
amd | ryzen_5_7645hx | - | |
amd | ryzen_5_pro_7640hs | - | |
amd | ryzen_5_pro_7645 | - | |
amd | ryzen_7_6800h | - | |
amd | ryzen_7_6800hs | - | |
amd | ryzen_7_6800u | - | |
amd | ryzen_7_7700 | - | |
amd | ryzen_7_7700x | - | |
amd | ryzen_7_7735hs | - | |
amd | ryzen_7_7735u | - | |
amd | ryzen_7_7736u | - | |
amd | ryzen_7_7745hx | - | |
amd | ryzen_7_7800x3d | - | |
amd | ryzen_7_7840h | - | |
amd | ryzen_7_7840u | - | |
amd | ryzen_7_pro_7745 | - | |
amd | ryzen_7_pro_7840hs | - | |
amd | ryzen_9_6900hs | - | |
amd | ryzen_9_6900hx | - | |
amd | ryzen_9_6980hs | - | |
amd | ryzen_9_6980hx | - | |
amd | ryzen_9_7845hx | - | |
amd | ryzen_9_7900 | - | |
amd | ryzen_9_7900x | - | |
amd | ryzen_9_7900x3d | - | |
amd | ryzen_9_7940h | - | |
amd | ryzen_9_7945hx | - | |
amd | ryzen_9_7945hx3d | - | |
amd | ryzen_9_7950x | - | |
amd | ryzen_9_7950x3d | - | |
amd | ryzen_9_pro_7940hs | - | |
amd | ryzen_9_pro_7945 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "7162DB91-6B5C-4575-A8D0-B83B34908BE5", versionEndExcluding: "23.9.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*", matchCriteriaId: "2BB37AAC-3957-4840-B47E-ED678F0B6044", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1DA067-DE94-4663-91CD-A70CC386D45A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "2841E9B4-728C-4201-AAF1-3250A1DC08F3", versionEndExcluding: "23.q4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*", matchCriteriaId: "CFF5CD86-64D3-4F02-9971-AC50E8052986", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "7162DB91-6B5C-4575-A8D0-B83B34908BE5", versionEndExcluding: "23.9.2", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "2841E9B4-728C-4201-AAF1-3250A1DC08F3", versionEndExcluding: "23.q4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*", matchCriteriaId: "48F04B9F-8C65-476B-B5D8-18CC96E3B712", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", matchCriteriaId: "495E436C-B0EE-4B72-AB49-332F4752C140", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", matchCriteriaId: "1C4FDE72-050C-4A72-A4F4-9C1D5273CADD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", matchCriteriaId: "7D260012-5D8F-4B36-8B88-82DB0291EE9D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", matchCriteriaId: "025E494E-953E-426E-BE89-6F2360A3AAC4", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", matchCriteriaId: "1232B034-1214-4F9A-823D-DC76D5C5956B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*", matchCriteriaId: "0870FBE4-92B4-4717-88B0-EC1094268034", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", matchCriteriaId: "EE36D471-57BF-4385-A825-029F7313E4DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", matchCriteriaId: "082BE536-F29C-4A73-B030-A19DD3A448B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*", matchCriteriaId: "36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "6740A06F-4512-427D-9CB9-A4A6DB046BA3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6C05D51F-469D-487D-9FC8-E1AD699A6F74", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", matchCriteriaId: "BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*", matchCriteriaId: "9BC5E111-A7AA-4A45-A2E3-47013F9135D4", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5D5B25-F32A-493E-BD54-57098981E15A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0E3657C6-1047-4CA9-8D44-C7143F7D877D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*", matchCriteriaId: "D2787C72-42D5-42B0-BE5B-E548B319BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", matchCriteriaId: "09B085FF-EAEA-42BC-BA60-3AA9B76141B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "760F20CC-9034-462C-A25E-C009E2218C38", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", matchCriteriaId: "1D2CBCEA-AB4F-444C-9CCD-A976003F796C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", matchCriteriaId: "76121981-8DC2-4779-833E-4B15CFCF7FC3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", matchCriteriaId: "225E8405-04FF-4885-92C8-8581ACC66E06", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", matchCriteriaId: "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", matchCriteriaId: "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", matchCriteriaId: "5D50E8EA-ECB2-463D-BA51-D13CF5A02266", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", matchCriteriaId: "69289284-2ED2-4D8B-8AE2-B835AAF31EAD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6CD984-A8C7-4B23-8FF9-896C503EBA37", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", matchCriteriaId: "D2D0429F-F186-4F78-9AE0-574E3A39926D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*", matchCriteriaId: "E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", matchCriteriaId: "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8480A7E0-882C-4B03-ADBC-697304B0B7C5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "B21FB338-F944-40F9-8F0C-99B471AAD51E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "3674D656-9623-4B39-AADE-158FE70FF29F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", matchCriteriaId: "BD27234D-ACFC-4144-8980-2B706822C579", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", matchCriteriaId: "5602B902-9FDB-4946-BE4C-236262285F2F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", matchCriteriaId: "AA666DF3-C5F3-4127-A8EE-B784DD41F642", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "86CAA682-9666-4929-B1AC-D9DB3109DB1A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*", matchCriteriaId: "5A7E6806-A7AC-4C96-960B-B8934CEA2439", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", matchCriteriaId: "74DD4A40-B712-4B54-9CC7-0BFD79E917BA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", matchCriteriaId: "82CCEE11-392D-4486-A6AD-CB64FB8B7081", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", matchCriteriaId: "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "F05C8669-6348-4A1B-B1D4-D22022E1F67E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*", matchCriteriaId: "018A02C9-2A5C-43E2-8CCD-4D03C119C22B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*", matchCriteriaId: "B3DE32CA-168F-4812-AEAE-D771EB01E15D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "\n\n\nAn improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n", }, { lang: "es", value: "Una gestión de privilegios inadecuada en el controlador de gráficos AMD Radeon™ puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones físicas arbitrarias, lo que resulta en una posible ejecución de código arbitrario.", }, ], id: "CVE-2023-20598", lastModified: "2024-11-21T07:41:12.177", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-10-17T14:15:09.813", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-269", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Severity ?
Summary
A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.", }, { lang: "es", value: "Se presenta un problema potencial de denegación de servicio en AMD Display driver Escape 0x130007 Call handler. Un atacante con bajo privilegio podría inducir potencialmente un BugCheck de Windows", }, ], id: "CVE-2020-12920", lastModified: "2024-11-21T05:00:32.737", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T16:15:09.380", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 08:01
Severity ?
Summary
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_7600 | - | |
amd | radeon_rx_7600m | - | |
amd | radeon_rx_7600m_xt | - | |
amd | radeon_rx_7600s | - | |
amd | radeon_rx_7700_xt | - | |
amd | radeon_rx_7700s | - | |
amd | radeon_rx_7800_xt | - | |
amd | radeon_rx_7900_gre | - | |
amd | radeon_rx_7900_xt | - | |
amd | radeon_rx_7900_xtx | - | |
amd | radeon_rx_7900m | - | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_pro_w7500 | - | |
amd | radeon_pro_w7600 | - | |
amd | radeon_pro_w7800 | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | radeon_pro_vega_56_firmware | - | |
amd | radeon_pro_vega_56 | - | |
amd | radeon_pro_vega_64_firmware | - | |
amd | radeon_pro_vega_64 | - | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | ryzen_3_3015ce | - | |
amd | ryzen_3_3015e | - | |
amd | ryzen_3_4100 | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_4500 | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600hs | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_4680u | - | |
amd | ryzen_5_5500h | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_pro_3200g | - | |
amd | ryzen_5_pro_3200ge | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800hs | - | |
amd | ryzen_7_4980u | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_4900hs | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135", versionEndExcluding: "23.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467", versionEndExcluding: "23.q3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "52880029-7A09-47F5-84B9-7A8A77D883F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "2819B30C-7A03-4A3B-8D34-080A85E83AE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40A38A14-D45C-4746-BCDC-D26D178B1426", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "4D89E1B8-509D-428E-984C-E23D808A0006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135", versionEndExcluding: "23.7.1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467", versionEndExcluding: "23.q3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*", matchCriteriaId: "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*", matchCriteriaId: "7774C021-B18A-473A-90B5-48A95071E5BA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*", matchCriteriaId: "263E53BD-7A57-40AC-8A35-D761BD3895A5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", matchCriteriaId: "E02A9C95-DF12-4816-88C3-6AFC331B8426", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*", matchCriteriaId: "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", matchCriteriaId: "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", matchCriteriaId: "CDA92163-5A72-4271-89D4-401C24950F62", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "510FB098-A28C-46AD-9244-438DC828A007", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", matchCriteriaId: "954500F1-6466-4A1C-8E0C-D759121CEBDC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", matchCriteriaId: "73A4079E-01E9-4807-A293-F6E843752554", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "9048FE84-62DA-4C1F-9EF2-0E94A10D116F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "0D111819-345A-4BAF-83D0-1153209AFCEB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", matchCriteriaId: "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", matchCriteriaId: "0D70D28B-809E-456C-96ED-84A4CA7EC942", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "444F83B8-ABD0-401C-8028-CAF0DEECF7BB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", matchCriteriaId: "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", matchCriteriaId: "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C5F418C-2989-44C0-A880-A7BBA067E581", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n", }, { lang: "es", value: "Una validación de entrada incorrecta en el controlador de pantalla AMD RadeonTM Graphics puede permitir que un atacante dañe la pantalla, lo que podría provocar una denegación de servicio.", }, ], id: "CVE-2023-31320", lastModified: "2024-11-21T08:01:46.340", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:25.070", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Severity ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.", }, { lang: "es", value: "Una vulnerabilidad de comprobación de punteros insuficiente en AMD Graphics Driver para Windows puede permitir a usuarios no privilegiados comprometer el sistema", }, ], id: "CVE-2020-12963", lastModified: "2024-11-21T05:00:35.597", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T16:15:09.480", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-763", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 15:15
Modified
2024-11-21 05:00
Severity ?
Summary
A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.", }, { lang: "es", value: "Se presenta un problema potencial de escalada de privilegios/denegación de servicio en AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. Un atacante poco privilegiado podría inducir potencialmente un BugCheck de Windows o escribir para filtrar información", }, ], id: "CVE-2020-12964", lastModified: "2024-11-21T05:00:35.713", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T15:15:06.687", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Severity ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
microsoft | windows_10 | - | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766", versionEndExcluding: "21.q1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, { lang: "es", value: "Una vulnerabilidad de comprobación de puntero insuficiente en el controlador de gráficos AMD para Windows 10 puede conllevar a una escalada de privilegios o denegación de servicio", }, ], id: "CVE-2020-12985", lastModified: "2024-11-21T05:00:37.010", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-11T22:15:11.507", references: [ { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Severity ?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.", }, { lang: "es", value: "Un Desbordamiento del Búfer de la Pila en AMD Graphics Driver para Windows 10 en Escape 0x15002a puede conllevar a una escalada de privilegios o una denegación de servicio", }, ], id: "CVE-2020-12893", lastModified: "2024-11-21T05:00:30.680", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T20:15:19.467", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
psirt@amd.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | radeon_rx_vega_m_firmware | * | |
intel | core_i5-8305g | - | |
intel | core_i7-8705g | - | |
intel | core_i7-8706g | - | |
intel | core_i7-8709g | - | |
intel | nuc_8_enthusiast_nuc8i7hnkqc | - | |
intel | nuc_8_enthusiast_nuc8i7hvkva | - | |
intel | nuc_8_enthusiast_nuc8i7hvkvaw | - | |
intel | nuc_kit_nuc8i7hnk | - | |
intel | nuc_kit_nuc8i7hvk | - | |
amd | radeon_software | * | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_7600 | - | |
amd | radeon_rx_7600m | - | |
amd | radeon_rx_7600m_xt | - | |
amd | radeon_rx_7600s | - | |
amd | radeon_rx_7700_xt | - | |
amd | radeon_rx_7700s | - | |
amd | radeon_rx_7800_xt | - | |
amd | radeon_rx_7900_gre | - | |
amd | radeon_rx_7900_xt | - | |
amd | radeon_rx_7900_xtx | - | |
amd | radeon_rx_7900m | - | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_pro_w7500 | - | |
amd | radeon_pro_w7600 | - | |
amd | radeon_pro_w7800 | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | radeon_pro_vega_56_firmware | - | |
amd | radeon_pro_vega_56 | - | |
amd | radeon_pro_vega_64_firmware | - | |
amd | radeon_pro_vega_64 | - | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | ryzen_3_3015ce | - | |
amd | ryzen_3_3015e | - | |
amd | ryzen_3_4100 | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_4500 | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600hs | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_4680u | - | |
amd | ryzen_5_5500h | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_pro_3200g | - | |
amd | ryzen_5_pro_3200ge | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800hs | - | |
amd | ryzen_7_4980u | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_4900hs | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4", versionEndExcluding: "23.10.01.46", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", matchCriteriaId: "F4D55B9D-4BAB-4082-A33F-626E15229333", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", matchCriteriaId: "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", matchCriteriaId: "F423BBE6-327A-40DC-8BCE-BF43600A68D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", matchCriteriaId: "08718840-D468-4E86-8FFF-A2B1841E6BF6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1A4CCCB-01CC-4488-9336-C0C379ABE609", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*", matchCriteriaId: "F2C17AD1-F813-484D-AC73-4A9BBCE233BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", matchCriteriaId: "C95A2886-F2CC-45A3-8877-AE894FF86898", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", matchCriteriaId: "244CD6EC-780A-405E-8CFA-666A666FF7D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", matchCriteriaId: "1D391590-652D-4B98-89F1-9F31F479448B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135", versionEndExcluding: "23.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467", versionEndExcluding: "23.q3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "52880029-7A09-47F5-84B9-7A8A77D883F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "2819B30C-7A03-4A3B-8D34-080A85E83AE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40A38A14-D45C-4746-BCDC-D26D178B1426", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "4D89E1B8-509D-428E-984C-E23D808A0006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135", versionEndExcluding: "23.7.1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467", versionEndExcluding: "23.q3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*", matchCriteriaId: "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*", matchCriteriaId: "7774C021-B18A-473A-90B5-48A95071E5BA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*", matchCriteriaId: "263E53BD-7A57-40AC-8A35-D761BD3895A5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", matchCriteriaId: "E02A9C95-DF12-4816-88C3-6AFC331B8426", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*", matchCriteriaId: "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", matchCriteriaId: "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", matchCriteriaId: "CDA92163-5A72-4271-89D4-401C24950F62", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "510FB098-A28C-46AD-9244-438DC828A007", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", matchCriteriaId: "954500F1-6466-4A1C-8E0C-D759121CEBDC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", matchCriteriaId: "73A4079E-01E9-4807-A293-F6E843752554", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "9048FE84-62DA-4C1F-9EF2-0E94A10D116F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "0D111819-345A-4BAF-83D0-1153209AFCEB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", matchCriteriaId: "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", matchCriteriaId: "0D70D28B-809E-456C-96ED-84A4CA7EC942", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "444F83B8-ABD0-401C-8028-CAF0DEECF7BB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", matchCriteriaId: "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", matchCriteriaId: "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C5F418C-2989-44C0-A880-A7BBA067E581", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n", }, { lang: "es", value: "La verificación inadecuada de la firma del controlador RadeonTM RX Vega M Graphics para Windows puede permitir que un atacante con privilegios de administrador inicie RadeonInstaller.exe sin validar la firma del archivo, lo que podría provocar la ejecución de código arbitrario.", }, ], id: "CVE-2023-20568", lastModified: "2024-11-21T07:41:08.400", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:15.930", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-347", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Severity ?
Summary
Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.", }, { lang: "es", value: "La interfaz de llamada de escape en AMD Graphics Driver para Windows puede causar una escalada de privilegios", }, ], id: "CVE-2020-12962", lastModified: "2024-11-21T05:00:35.480", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T20:15:19.743", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Severity ?
Summary
An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
microsoft | windows_10 | - | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766", versionEndExcluding: "21.q1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, { lang: "es", value: "Una vulnerabilidad de lectura y escritura fuera de los límites en el controlador de gráficos AMD para Windows 10 puede conllevar a una escalada de privilegios o denegación de servicio", }, ], id: "CVE-2020-12980", lastModified: "2024-11-21T05:00:36.517", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-11T22:15:11.337", references: [ { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Severity ?
Summary
An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
microsoft | windows_10 | - | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766", versionEndExcluding: "21.q1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, { lang: "es", value: "Una vulnerabilidad sin puntero de objeto no válido en el controlador de gráficos AMD para Windows 10 puede conllevar a una escalada de privilegios o denegación de servicio", }, ], id: "CVE-2020-12982", lastModified: "2024-11-21T05:00:36.770", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-11T22:15:11.410", references: [ { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-763", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 19:15
Modified
2024-11-21 05:00
Severity ?
Summary
An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "3017A2C8-6079-4639-952E-E895FB6CB9A2", versionEndExcluding: "21.3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.", }, { lang: "es", value: "Una ruta de búsqueda no confiable en el instalador de configuración de AMD Radeon puede conllevar a una escalada de privilegios o una ejecución de código no autorizada", }, ], id: "CVE-2020-12892", lastModified: "2024-11-21T05:00:30.540", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T19:15:07.187", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-426", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | enterprise_driver | * | |
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*", matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9", versionEndExcluding: "22.10.20", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643", versionEndExcluding: "22.q2", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A", versionEndExcluding: "22.5.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.", }, { lang: "es", value: "La verificación insuficiente de múltiples firmas de encabezado mientras se carga una aplicación confiable (TA) puede permitir que un atacante con privilegios obtenga la ejecución de código en esa TA o el sistema operativo/kernel.", }, ], id: "CVE-2021-26391", lastModified: "2024-11-21T05:56:16.620", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-09T21:15:12.150", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Severity ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
microsoft | windows_10 | - | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766", versionEndExcluding: "21.q1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.", }, { lang: "es", value: "Una vulnerabilidad de comprobación de puntero insuficiente en el controlador de gráficos AMD para Windows 10 puede causar la ejecución de código arbitrario en el kernel, lo que lleva a una escalada de privilegios o denegación de servicio", }, ], id: "CVE-2020-12986", lastModified: "2024-11-21T05:00:37.113", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-11T22:15:11.540", references: [ { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Severity ?
Summary
Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .", }, { lang: "es", value: "Una comprobación inapropiada de parámetros en algunas aplicaciones confiable de la PSP contenida en AMD Graphics Driver puede permitir a un atacante local omitir las restricciones de seguridad y lograr una ejecución de código arbitrario", }, ], id: "CVE-2020-12929", lastModified: "2024-11-21T05:00:33.343", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T16:15:09.433", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Severity ?
Summary
A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | athlon_3050ge_firmware | - | |
amd | athlon_3050ge | - | |
amd | athlon_3150ge_firmware | - | |
amd | athlon_3150ge | - | |
amd | athlon_3150g_firmware | - | |
amd | athlon_3150g | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | - | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | - | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*", matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB1639FB-C5B9-4DC6-9758-43C628914D8C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*", matchCriteriaId: "A394396F-CED4-4A52-ACA2-A0B74A1AE97E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8F810170-5792-4C69-9D0A-DC9422CB3D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*", matchCriteriaId: "6678421F-CD05-445F-B114-293609732777", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*", matchCriteriaId: "B233FD6C-2F8A-4542-B353-3E7B6D77CD94", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6512668F-EEFB-4654-AE7F-9F71F89F3B65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", matchCriteriaId: "6AC4BECA-6023-4225-9685-937E47C67C1F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8198CED9-216C-4573-B766-B6CDB3E6F7CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", matchCriteriaId: "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B75781D-051F-44C1-B79F-1C32AFECFF65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D7F33C-F522-4A20-9055-1662178D7F27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2093BCDB-70F3-4D90-B899-B2801F8A6059", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.", }, { lang: "es", value: "Una UApp o ABL maliciosa o comprometida puede ser usada por un atacante para emitir una llamada al sistema malformada que resulte en el mapeo de registros confidenciales de System Management Network (SMN) conllevando a una pérdida de integridad y disponibilidad", }, ], id: "CVE-2021-26362", lastModified: "2024-11-21T05:56:12.600", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.6, confidentialityImpact: "NONE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:N/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 9.2, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-12T18:16:53.183", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:00
Severity ?
Summary
Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | enterprise_driver | * | |
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | ryzen_3_2200ge_firmware | - | |
amd | ryzen_3_2200ge | - | |
amd | ryzen_3_2200g_firmware | - | |
amd | ryzen_3_2200g | - | |
amd | ryzen_5_2400ge_firmware | - | |
amd | ryzen_5_2400ge | - | |
amd | ryzen_5_2400g_firmware | - | |
amd | ryzen_5_2400g | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3900xt_firmware | - | |
amd | ryzen_9_3900xt | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_5_5500_firmware | - | |
amd | ryzen_5_5500 | - | |
amd | ryzen_5_5600_firmware | - | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_7_5700x_firmware | - | |
amd | ryzen_7_5700x | - | |
amd | ryzen_7_5800x_firmware | - | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | - | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5800x3d_firmware | - | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_9_5900_firmware | - | |
amd | ryzen_9_5900 | - | |
amd | ryzen_9_5900x_firmware | - | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5950x_firmware | - | |
amd | ryzen_9_5950x | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | athlon_silver_3050e_firmware | - | |
amd | athlon_silver_3050e | - | |
amd | athlon_pro_3045b_firmware | - | |
amd | athlon_pro_3045b | - | |
amd | athlon_silver_3050u_firmware | - | |
amd | athlon_silver_3050u | - | |
amd | athlon_silver_3050c_firmware | - | |
amd | athlon_silver_3050c | - | |
amd | athlon_pro_3145b_firmware | - | |
amd | athlon_pro_3145b | - | |
amd | athlon_gold_3150u_firmware | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_gold_3150c_firmware | - | |
amd | athlon_gold_3150c | - | |
amd | ryzen_3_3250u_firmware | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3250c_firmware | - | |
amd | ryzen_3_3250c | - | |
amd | amd_3020e_firmware | - | |
amd | amd_3020e | - | |
amd | amd_3015e_firmware | - | |
amd | amd_3015e | - | |
amd | amd_3015ce_firmware | - | |
amd | amd_3015ce | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3350u_firmware | - | |
amd | ryzen_3_3350u | - | |
amd | ryzen_5_3450u_firmware | - | |
amd | ryzen_5_3450u | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3500c_firmware | - | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700c_firmware | - | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_3_pro_3200ge_firmware | - | |
amd | ryzen_3_pro_3200ge | - | |
amd | ryzen_3_3200g_firmware | - | |
amd | ryzen_3_3200g | - | |
amd | ryzen_3_pro_3200g_firmware | - | |
amd | ryzen_3_pro_3200g | - | |
amd | ryzen_5_pro_3350ge_firmware | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3350g_firmware | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3400ge_firmware | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_5_pro_3400g_firmware | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*", matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9", versionEndExcluding: "22.10.20", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643", versionEndExcluding: "22.q2", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A", versionEndExcluding: "22.5.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E3C57977-E2BA-494F-AA3C-B460117B2996", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0D0E24-0615-4F6C-947D-CFA59D114486", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "41C3746E-6D5F-47B5-BE13-1A6DC004F79B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*", matchCriteriaId: "B682A8FF-B83F-41A5-BA22-4394EC0C4457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B38ABACD-4E5D-440C-9464-C894DB610C94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "B230F1D4-FF59-43E5-BC20-0BCD43A55683", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2503E43D-8415-4702-B7AA-22C472F4BE51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*", matchCriteriaId: "09ADB589-F43C-43A5-8CA6-B9D4D3294880", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F0E87F5-65BA-477D-9679-907FD2906298", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", matchCriteriaId: "51A56423-3DDE-451B-AC47-51715AC74F41", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "927B2661-8988-484F-965C-D94AA9D52911", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", matchCriteriaId: "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3D814C2A-D794-46A8-9A06-CC4DB387176F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", matchCriteriaId: "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4350ADE3-9A31-4A23-9B15-7A44E8F29E90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", matchCriteriaId: "7E52108F-FAAE-4075-8F87-239008E77009", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "E309B1D5-E232-4F26-BF35-25A1542A5E10", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", matchCriteriaId: "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", matchCriteriaId: "F4E68C36-118D-41F9-900E-9F38F585A34D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E654C546-AAEE-4DDA-81B4-144DD5766F9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "487D6661-ECA7-44C0-BD46-FC8C03187B85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "777D94BA-613B-49E9-B1B3-2A9E0FC35908", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", matchCriteriaId: "34045719-7683-4621-929B-5F6B16B6A580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "331E829F-D05A-4D6D-A017-A2BE0D7C3D09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE2DD3E-51C4-4E21-BC43-CE567812B59A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", matchCriteriaId: "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54611A05-BCA3-495A-8CDB-946FF47E0333", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3CC4654E-519B-4412-B551-F2436108152B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "38997E8B-D2B7-4AB2-BB6E-33966511AF38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40E3B591-EBC2-4C6A-8574-33F27F9AAE17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", matchCriteriaId: "951CA892-BAE2-46A4-BC86-0A205A4FA218", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6882B4E1-0BFF-4093-BE67-72294949C3F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", matchCriteriaId: "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", matchCriteriaId: "6CFF28BE-F049-4716-AADE-643FABB753A7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9E741A31-8265-45E0-9834-23D00D5F8176", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", matchCriteriaId: "FEE30066-A56C-4997-BED2-FEB4F61D9F09", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "07D642E6-4D91-49C3-B8BB-8B4575CE99D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", matchCriteriaId: "9E514E0C-397F-4DF3-AD79-D7C800BAA28A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "610909ED-A636-4007-A50F-500057340E70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", matchCriteriaId: "57E11A9D-03EC-4014-BB1C-5286C694581B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1902D5CE-4BBB-45F7-9D52-28AF43F460CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", matchCriteriaId: "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C29793-1142-4506-8C32-3B89227BB3A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "913A2DC9-4215-486B-BD15-3AF515E3CDCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", matchCriteriaId: "1708574D-CFD3-4CB7-9037-8B5D4070E5BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4DF8A936-58AE-44BB-897E-44782232394F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*", matchCriteriaId: "E9FC3889-3F62-48AC-876D-5A630A5E2AD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D79E460A-D34C-4120-8529-F32988793DC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*", matchCriteriaId: "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "069392FC-51DB-49F0-B30B-8ED46C694057", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*", matchCriteriaId: "A7CF1D17-05FD-4A2C-8339-C72B4BA27218", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", matchCriteriaId: "9921AE2D-F497-47C8-B463-947E230CF4F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", matchCriteriaId: "2452A625-5B59-49DF-A3C3-872642181E9D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "51D4403E-C626-4817-B0C9-ECEC420C517D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", matchCriteriaId: "533144EB-802F-496D-8C09-15AEA537F89B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DFDD574D-1799-4386-A906-705DC2F0978F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", matchCriteriaId: "DCDAE070-C41A-4D8C-BE0D-DBD434760749", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "58EE3F9B-6950-4F83-B0BE-ADA560457BC1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", matchCriteriaId: "5B16B55B-11B3-43DB-860A-62CD3020B536", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", matchCriteriaId: "A8C6F103-30CC-4738-B489-B12790836B1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2EC993-8A65-416B-939F-1C707D596AF9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0359E9DA-5BC0-48FD-962C-34358691E7DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", matchCriteriaId: "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "945182A3-1BE3-459D-BC45-5554FB905C3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", matchCriteriaId: "0C03B5C8-9337-422B-9474-08EBBD0E0A45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", matchCriteriaId: "228E3FBD-F997-402D-AE96-B14D66390700", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", matchCriteriaId: "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF105508-6252-4101-92B5-ECA9022D4720", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE83C48-571F-4BD6-ABE3-2B14ED510D13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EAFFAD03-CEE3-4C35-B6D2-627004A22934", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "926812AD-94F0-4CB8-9890-EAB11FDC1804", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9724784-3A56-4175-9829-796CF687CA09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40933267-3CEF-417E-BE95-37B562F37E78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.", }, { lang: "es", value: "El manejo inadecuado de los parámetros en los controladores del AMD Secure Processor (ASP) puede permitir que un atacante privilegiado eleve sus privilegios, lo que podría provocar una pérdida de integridad.", }, ], id: "CVE-2020-12930", lastModified: "2024-11-21T05:00:33.470", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-09T21:15:10.580", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:28
Severity ?
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_software | * | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "F71B3286-B679-4DC0-BDD1-784AC5577094", versionEndExcluding: "23.12.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*", matchCriteriaId: "49540C5D-CEC7-4BCB-882B-73843CAFD55A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "4397FD7C-3357-4F01-98F4-131000D23AA0", versionEndIncluding: "23.q4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.", }, { lang: "es", value: "Una validación de dirección DRAM insuficiente en PMFW puede permitir que un atacante privilegiado lea desde una dirección DRAM no válida a SRAM, lo que podría provocar corrupción de datos o denegación de servicio.", }, ], id: "CVE-2023-20510", lastModified: "2024-12-12T20:28:55.010", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 4.7, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 4.2, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-13T17:15:18.777", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Severity ?
Summary
An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
microsoft | windows_10 | - | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766", versionEndExcluding: "21.q1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.", }, { lang: "es", value: "Una comprobación de entrada insuficiente en el controlador de gráficos AMD para Windows 10 puede permitir que los usuarios sin privilegios descarguen el controlador, lo que podría causar daños en la memoria en los procesos con muchos privilegios, lo que puede conllevar a una escalada de privilegios o la denegación de servicio", }, ], id: "CVE-2020-12981", lastModified: "2024-11-21T05:00:36.650", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-11T22:15:11.373", references: [ { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Severity ?
Summary
Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.", }, { lang: "es", value: "Un Uso de Memoria Previamente Liberada en AMD Graphics Driver para Windows 10 puede conllevar un desvío de KASLR o la divulgación de información", }, ], id: "CVE-2020-12901", lastModified: "2024-11-21T05:00:31.603", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T20:15:19.560", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-04 23:15
Modified
2024-11-21 05:00
Severity ?
Summary
AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_pro_software | * | |
amd | radeon_software | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "C5BBBA61-F9B3-41D4-BAD1-8D31C9868F6F", versionEndExcluding: "21.q2", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "00350248-7850-480A-BACF-89DC9194F34E", versionEndExcluding: "21.4.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.", }, { lang: "es", value: "El software Radeon de AMD puede ser vulnerable a un secuestro de DLL mediante la variable de ruta. Un usuario no privilegiado puede ser capaz de soltar su archivo DLL malicioso en cualquier ubicación que esté en la variable de entorno path", }, ], id: "CVE-2020-12891", lastModified: "2024-11-21T05:00:30.393", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-04T23:15:10.247", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-427", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Severity ?
Summary
Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.", }, { lang: "es", value: "Una lectura arbitraria en AMD Graphics Driver para Windows 10 puede conllevar a una omisión de KASLR o una denegación de servicio", }, ], id: "CVE-2020-12899", lastModified: "2024-11-21T05:00:31.330", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.6, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T16:15:09.177", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Severity ?
Summary
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | - | |
amd | athlon_3050ge_firmware | - | |
amd | athlon_3050ge | - | |
amd | athlon_3150g_firmware | - | |
amd | athlon_3150g | - | |
amd | athlon_3150ge_firmware | - | |
amd | athlon_3150ge | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | - | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | - | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*", matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB1639FB-C5B9-4DC6-9758-43C628914D8C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*", matchCriteriaId: "A394396F-CED4-4A52-ACA2-A0B74A1AE97E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*", matchCriteriaId: "B233FD6C-2F8A-4542-B353-3E7B6D77CD94", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8F810170-5792-4C69-9D0A-DC9422CB3D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*", matchCriteriaId: "6678421F-CD05-445F-B114-293609732777", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CBA86063-6EE8-446E-BCE1-210B0699103B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6512668F-EEFB-4654-AE7F-9F71F89F3B65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", matchCriteriaId: "6AC4BECA-6023-4225-9685-937E47C67C1F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8198CED9-216C-4573-B766-B6CDB3E6F7CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", matchCriteriaId: "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8650BE66-7694-4DD9-94E5-73A7DD0A124D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", matchCriteriaId: "94AB5202-A5A2-479E-B4B0-347C823201AD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B75781D-051F-44C1-B79F-1C32AFECFF65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D7F33C-F522-4A20-9055-1662178D7F27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2093BCDB-70F3-4D90-B899-B2801F8A6059", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27CDB416-B093-4871-8142-1D7EB5BF90B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", matchCriteriaId: "52C9FEEF-0D0F-40DC-9E98-248F8608B755", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", matchCriteriaId: "3964CA7C-996C-43C5-B1A5-14046DAD07BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5454A72B-76EC-46D9-8675-97DC076D7615", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.", }, { lang: "es", value: "Una UApp o ABL maliciosa o comprometida puede ser usada por un atacante para enviar una llamada al sistema malformada al cargador de arranque, resultando en accesos a memoria fuera de límites", }, ], id: "CVE-2021-26369", lastModified: "2024-11-21T05:56:13.677", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-12T18:16:53.257", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | enterprise_driver | * | |
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*", matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9", versionEndExcluding: "22.10.20", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643", versionEndExcluding: "22.q2", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A", versionEndExcluding: "22.5.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.", }, { lang: "es", value: "Un atacante con acceso local al sistema puede realizar modificaciones no autorizadas en la configuración de seguridad de los registros SOC. Esto podría permitir una posible corrupción del contenido de la memoria cifrada del procesador seguro AMD, lo que podría provocar la ejecución de código arbitrario en ASP.", }, ], id: "CVE-2021-26360", lastModified: "2024-11-21T05:56:12.317", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-09T21:15:11.690", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:00
Severity ?
Summary
Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | enterprise_driver | * | |
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | ryzen_3_2200ge_firmware | - | |
amd | ryzen_3_2200ge | - | |
amd | ryzen_3_2200g_firmware | - | |
amd | ryzen_3_2200g | - | |
amd | ryzen_5_2400ge_firmware | - | |
amd | ryzen_5_2400ge | - | |
amd | ryzen_5_2400g_firmware | - | |
amd | ryzen_5_2400g | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3900xt_firmware | - | |
amd | ryzen_9_3900xt | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_5_5500_firmware | - | |
amd | ryzen_5_5500 | - | |
amd | ryzen_5_5600_firmware | - | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_7_5700x_firmware | - | |
amd | ryzen_7_5700x | - | |
amd | ryzen_7_5800x_firmware | - | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | - | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5800x3d_firmware | - | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_9_5900_firmware | - | |
amd | ryzen_9_5900 | - | |
amd | ryzen_9_5900x_firmware | - | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5950x_firmware | - | |
amd | ryzen_9_5950x | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | athlon_silver_3050e_firmware | - | |
amd | athlon_silver_3050e | - | |
amd | athlon_pro_3045b_firmware | - | |
amd | athlon_pro_3045b | - | |
amd | athlon_silver_3050u_firmware | - | |
amd | athlon_silver_3050u | - | |
amd | athlon_silver_3050c_firmware | - | |
amd | athlon_silver_3050c | - | |
amd | athlon_pro_3145b_firmware | - | |
amd | athlon_pro_3145b | - | |
amd | athlon_gold_3150u_firmware | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_gold_3150c_firmware | - | |
amd | athlon_gold_3150c | - | |
amd | ryzen_3_3250u_firmware | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3250c_firmware | - | |
amd | ryzen_3_3250c | - | |
amd | amd_3020e_firmware | - | |
amd | amd_3020e | - | |
amd | amd_3015e_firmware | - | |
amd | amd_3015e | - | |
amd | amd_3015ce_firmware | - | |
amd | amd_3015ce | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3350u_firmware | - | |
amd | ryzen_3_3350u | - | |
amd | ryzen_5_3450u_firmware | - | |
amd | ryzen_5_3450u | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3500c_firmware | - | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700c_firmware | - | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_3_pro_3200ge_firmware | - | |
amd | ryzen_3_pro_3200ge | - | |
amd | ryzen_3_3200g_firmware | - | |
amd | ryzen_3_3200g | - | |
amd | ryzen_3_pro_3200g_firmware | - | |
amd | ryzen_3_pro_3200g | - | |
amd | ryzen_5_pro_3350ge_firmware | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3350g_firmware | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3400ge_firmware | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_5_pro_3400g_firmware | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*", matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9", versionEndExcluding: "22.10.20", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643", versionEndExcluding: "22.q2", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A", versionEndExcluding: "22.5.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E3C57977-E2BA-494F-AA3C-B460117B2996", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0D0E24-0615-4F6C-947D-CFA59D114486", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "41C3746E-6D5F-47B5-BE13-1A6DC004F79B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*", matchCriteriaId: "B682A8FF-B83F-41A5-BA22-4394EC0C4457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B38ABACD-4E5D-440C-9464-C894DB610C94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "B230F1D4-FF59-43E5-BC20-0BCD43A55683", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2503E43D-8415-4702-B7AA-22C472F4BE51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*", matchCriteriaId: "09ADB589-F43C-43A5-8CA6-B9D4D3294880", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F0E87F5-65BA-477D-9679-907FD2906298", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", matchCriteriaId: "51A56423-3DDE-451B-AC47-51715AC74F41", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "927B2661-8988-484F-965C-D94AA9D52911", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", matchCriteriaId: "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3D814C2A-D794-46A8-9A06-CC4DB387176F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", matchCriteriaId: "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4350ADE3-9A31-4A23-9B15-7A44E8F29E90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*", matchCriteriaId: "7E52108F-FAAE-4075-8F87-239008E77009", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "E309B1D5-E232-4F26-BF35-25A1542A5E10", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", matchCriteriaId: "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", matchCriteriaId: "F4E68C36-118D-41F9-900E-9F38F585A34D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E654C546-AAEE-4DDA-81B4-144DD5766F9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "487D6661-ECA7-44C0-BD46-FC8C03187B85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "777D94BA-613B-49E9-B1B3-2A9E0FC35908", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", matchCriteriaId: "34045719-7683-4621-929B-5F6B16B6A580", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "331E829F-D05A-4D6D-A017-A2BE0D7C3D09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE2DD3E-51C4-4E21-BC43-CE567812B59A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", matchCriteriaId: "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54611A05-BCA3-495A-8CDB-946FF47E0333", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3CC4654E-519B-4412-B551-F2436108152B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "38997E8B-D2B7-4AB2-BB6E-33966511AF38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40E3B591-EBC2-4C6A-8574-33F27F9AAE17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", matchCriteriaId: "951CA892-BAE2-46A4-BC86-0A205A4FA218", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6882B4E1-0BFF-4093-BE67-72294949C3F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", matchCriteriaId: "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", matchCriteriaId: "6CFF28BE-F049-4716-AADE-643FABB753A7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9E741A31-8265-45E0-9834-23D00D5F8176", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", matchCriteriaId: "FEE30066-A56C-4997-BED2-FEB4F61D9F09", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "07D642E6-4D91-49C3-B8BB-8B4575CE99D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", matchCriteriaId: "9E514E0C-397F-4DF3-AD79-D7C800BAA28A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "610909ED-A636-4007-A50F-500057340E70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", matchCriteriaId: "57E11A9D-03EC-4014-BB1C-5286C694581B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1902D5CE-4BBB-45F7-9D52-28AF43F460CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", matchCriteriaId: "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C29793-1142-4506-8C32-3B89227BB3A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "913A2DC9-4215-486B-BD15-3AF515E3CDCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", matchCriteriaId: "1708574D-CFD3-4CB7-9037-8B5D4070E5BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4DF8A936-58AE-44BB-897E-44782232394F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*", matchCriteriaId: "E9FC3889-3F62-48AC-876D-5A630A5E2AD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D79E460A-D34C-4120-8529-F32988793DC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*", matchCriteriaId: "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "069392FC-51DB-49F0-B30B-8ED46C694057", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*", matchCriteriaId: "A7CF1D17-05FD-4A2C-8339-C72B4BA27218", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", matchCriteriaId: "9921AE2D-F497-47C8-B463-947E230CF4F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", matchCriteriaId: "2452A625-5B59-49DF-A3C3-872642181E9D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "51D4403E-C626-4817-B0C9-ECEC420C517D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", matchCriteriaId: "533144EB-802F-496D-8C09-15AEA537F89B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DFDD574D-1799-4386-A906-705DC2F0978F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", matchCriteriaId: "DCDAE070-C41A-4D8C-BE0D-DBD434760749", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "58EE3F9B-6950-4F83-B0BE-ADA560457BC1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", matchCriteriaId: "5B16B55B-11B3-43DB-860A-62CD3020B536", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", matchCriteriaId: "A8C6F103-30CC-4738-B489-B12790836B1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2EC993-8A65-416B-939F-1C707D596AF9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0359E9DA-5BC0-48FD-962C-34358691E7DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", matchCriteriaId: "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "945182A3-1BE3-459D-BC45-5554FB905C3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", matchCriteriaId: "0C03B5C8-9337-422B-9474-08EBBD0E0A45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", matchCriteriaId: "228E3FBD-F997-402D-AE96-B14D66390700", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", matchCriteriaId: "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF105508-6252-4101-92B5-ECA9022D4720", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE83C48-571F-4BD6-ABE3-2B14ED510D13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EAFFAD03-CEE3-4C35-B6D2-627004A22934", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "926812AD-94F0-4CB8-9890-EAB11FDC1804", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9724784-3A56-4175-9829-796CF687CA09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40933267-3CEF-417E-BE95-37B562F37E78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.", }, { lang: "es", value: "El manejo inadecuado de los parámetros en el kernel del AMD Secure Processor (ASP) puede permitir que un atacante privilegiado eleve sus privilegios, lo que podría provocar una pérdida de integridad.", }, ], id: "CVE-2020-12931", lastModified: "2024-11-21T05:00:33.803", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-09T21:15:11.407", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-13 16:30
Severity ?
2.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_software | * | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "F71B3286-B679-4DC0-BDD1-784AC5577094", versionEndExcluding: "23.12.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*", matchCriteriaId: "49540C5D-CEC7-4BCB-882B-73843CAFD55A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "4397FD7C-3357-4F01-98F4-131000D23AA0", versionEndIncluding: "23.q4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.", }, { lang: "es", value: "La validación inadecuada del índice de matriz en el firmware de administración de energía (PMFW) puede permitir que un atacante privilegiado provoque una lectura de memoria fuera de los límites dentro de PMFW, lo que podría provocar una denegación de servicio.", }, ], id: "CVE-2023-31307", lastModified: "2024-12-13T16:30:30.840", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 2.3, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 1.4, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-13T17:15:20.500", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-129", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-129", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Severity ?
Summary
Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.", }, { lang: "es", value: "Una escritura arbitraria en AMD Graphics Driver para Windows 10 en el escape 0x40010d puede conllevar a una escritura arbitraria en la memoria del kernel o una denegación de servicio", }, ], id: "CVE-2020-12894", lastModified: "2024-11-21T05:00:30.813", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.6, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T20:15:19.513", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-11-12 18:15
Modified
2024-11-27 16:20
Severity ?
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6015.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | radeon_software_for_hip | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "8B95FEA4-F26E-45B0-9663-CF6730DB8400", versionEndExcluding: "24.6.1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:cloud:*:*:*", matchCriteriaId: "D3C200C2-56EB-4CD0-9EBF-D8D3BFE51CA5", versionEndExcluding: "24.7.1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "3C8C56D8-EA82-4166-AC00-A8416DA471FC", versionEndExcluding: "24.q2", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software_for_hip:*:*:*:*:pro:*:*:*", matchCriteriaId: "CB85FB48-9901-49CC-A2AA-47AFC6B134B4", versionEndExcluding: "24.10.16", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.", }, { lang: "es", value: "Los permisos predeterminados incorrectos en el directorio de instalación del SDK AMD HIP podrían permitir que un atacante logre una escalada de privilegios que potencialmente resulte en la ejecución de código arbitrario.", }, ], id: "CVE-2024-21937", lastModified: "2024-11-27T16:20:37.073", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.3, impactScore: 5.9, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-11-12T18:15:17.863", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6015.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-276", }, ], source: "psirt@amd.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-276", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Severity ?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.", }, { lang: "es", value: "Una lectura fuera de límites en AMD Graphics Driver para Windows 10 en el escape 0x3004403 puede conllevar a una divulgación de información arbitraria", }, ], id: "CVE-2020-12905", lastModified: "2024-11-21T05:00:32.200", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T20:15:19.647", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-12 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | - | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | - | |
amd | ryzen_5_5700ge | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*", matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CBA86063-6EE8-446E-BCE1-210B0699103B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8650BE66-7694-4DD9-94E5-73A7DD0A124D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", matchCriteriaId: "94AB5202-A5A2-479E-B4B0-347C823201AD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.", }, { lang: "es", value: "Una UApp o ABL maliciosa o comprometida podría potencialmente cambiar el valor que el ASP usa para su DRAM reservada, a uno fuera del área cercada, conllevando potencialmente a una exposición de datos", }, ], id: "CVE-2021-26363", lastModified: "2024-11-21T05:56:12.753", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 3.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-12T19:15:48.107", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Severity ?
Summary
An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
microsoft | windows_10 | - | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766", versionEndExcluding: "21.q1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.", }, { lang: "es", value: "Una vulnerabilidad de escritura fuera de los límites en el controlador de gráficos AMD para Windows 10 puede conllevar a una escalada de privilegios o la denegación de servicio", }, ], id: "CVE-2020-12983", lastModified: "2024-11-21T05:00:36.880", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-11T22:15:11.440", references: [ { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Severity ?
Summary
Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "3017A2C8-6079-4639-952E-E895FB6CB9A2", versionEndExcluding: "21.3.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.", }, { lang: "es", value: "Una divulgación de la Dirección de Pool del Kernel en AMD Graphics Driver para Windows 10 puede conllevar a una omisión de KASLR", }, ], id: "CVE-2020-12897", lastModified: "2024-11-21T05:00:31.083", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T16:15:09.130", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | enterprise_driver | * | |
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | ryzen_3_2200ge_firmware | - | |
amd | ryzen_3_2200ge | - | |
amd | ryzen_3_2200g_firmware | - | |
amd | ryzen_3_2200g | - | |
amd | ryzen_5_2400ge_firmware | - | |
amd | ryzen_5_2400ge | - | |
amd | ryzen_5_2400g_firmware | - | |
amd | ryzen_5_2400g | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | athlon_silver_3050e_firmware | - | |
amd | athlon_silver_3050e | - | |
amd | athlon_pro_3045b_firmware | - | |
amd | athlon_pro_3045b | - | |
amd | athlon_silver_3050u_firmware | - | |
amd | athlon_silver_3050u | - | |
amd | athlon_silver_3050c_firmware | - | |
amd | athlon_silver_3050c | - | |
amd | athlon_pro_3145b_firmware | - | |
amd | athlon_pro_3145b | - | |
amd | athlon_gold_3150u_firmware | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_gold_3150c_firmware | - | |
amd | athlon_gold_3150c | - | |
amd | ryzen_3_3250u_firmware | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3250c_firmware | - | |
amd | ryzen_3_3250c | - | |
amd | amd_3020e_firmware | - | |
amd | amd_3020e | - | |
amd | amd_3015e_firmware | - | |
amd | amd_3015e | - | |
amd | amd_3015ce_firmware | - | |
amd | amd_3015ce | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3350u_firmware | - | |
amd | ryzen_3_3350u | - | |
amd | ryzen_5_3450u_firmware | - | |
amd | ryzen_5_3450u | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3500c_firmware | - | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700c_firmware | - | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_3_pro_3200ge_firmware | - | |
amd | ryzen_3_pro_3200ge | - | |
amd | ryzen_3_3200g_firmware | - | |
amd | ryzen_3_3200g | - | |
amd | ryzen_3_pro_3200g_firmware | - | |
amd | ryzen_3_pro_3200g | - | |
amd | ryzen_5_pro_3350ge_firmware | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3350g_firmware | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3400ge_firmware | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_5_pro_3400g_firmware | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*", matchCriteriaId: "F418EA2F-C021-44A7-9A8F-F6512A857BF9", versionEndExcluding: "22.10.20", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643", versionEndExcluding: "22.q2", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A", versionEndExcluding: "22.5.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E3C57977-E2BA-494F-AA3C-B460117B2996", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0D0E24-0615-4F6C-947D-CFA59D114486", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "41C3746E-6D5F-47B5-BE13-1A6DC004F79B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*", matchCriteriaId: "B682A8FF-B83F-41A5-BA22-4394EC0C4457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B38ABACD-4E5D-440C-9464-C894DB610C94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "B230F1D4-FF59-43E5-BC20-0BCD43A55683", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2503E43D-8415-4702-B7AA-22C472F4BE51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*", matchCriteriaId: "09ADB589-F43C-43A5-8CA6-B9D4D3294880", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AD470C-C960-40C9-BC06-236B2391332E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34798EA1-7F05-4F3D-BFBF-05385C1807EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40E3B591-EBC2-4C6A-8574-33F27F9AAE17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", matchCriteriaId: "951CA892-BAE2-46A4-BC86-0A205A4FA218", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6882B4E1-0BFF-4093-BE67-72294949C3F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", matchCriteriaId: "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", matchCriteriaId: "6CFF28BE-F049-4716-AADE-643FABB753A7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9E741A31-8265-45E0-9834-23D00D5F8176", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", matchCriteriaId: "FEE30066-A56C-4997-BED2-FEB4F61D9F09", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "07D642E6-4D91-49C3-B8BB-8B4575CE99D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", matchCriteriaId: "9E514E0C-397F-4DF3-AD79-D7C800BAA28A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "610909ED-A636-4007-A50F-500057340E70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", matchCriteriaId: "57E11A9D-03EC-4014-BB1C-5286C694581B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1902D5CE-4BBB-45F7-9D52-28AF43F460CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", matchCriteriaId: "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", matchCriteriaId: "C0C29793-1142-4506-8C32-3B89227BB3A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "913A2DC9-4215-486B-BD15-3AF515E3CDCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", matchCriteriaId: "1708574D-CFD3-4CB7-9037-8B5D4070E5BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4DF8A936-58AE-44BB-897E-44782232394F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*", matchCriteriaId: "E9FC3889-3F62-48AC-876D-5A630A5E2AD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D79E460A-D34C-4120-8529-F32988793DC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*", matchCriteriaId: "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "069392FC-51DB-49F0-B30B-8ED46C694057", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*", matchCriteriaId: "A7CF1D17-05FD-4A2C-8339-C72B4BA27218", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", matchCriteriaId: "9921AE2D-F497-47C8-B463-947E230CF4F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", matchCriteriaId: "2452A625-5B59-49DF-A3C3-872642181E9D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "51D4403E-C626-4817-B0C9-ECEC420C517D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", matchCriteriaId: "533144EB-802F-496D-8C09-15AEA537F89B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DFDD574D-1799-4386-A906-705DC2F0978F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", matchCriteriaId: "DCDAE070-C41A-4D8C-BE0D-DBD434760749", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "58EE3F9B-6950-4F83-B0BE-ADA560457BC1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", matchCriteriaId: "5B16B55B-11B3-43DB-860A-62CD3020B536", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", matchCriteriaId: "A8C6F103-30CC-4738-B489-B12790836B1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2EC993-8A65-416B-939F-1C707D596AF9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0359E9DA-5BC0-48FD-962C-34358691E7DC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", matchCriteriaId: "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "945182A3-1BE3-459D-BC45-5554FB905C3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", matchCriteriaId: "0C03B5C8-9337-422B-9474-08EBBD0E0A45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", matchCriteriaId: "228E3FBD-F997-402D-AE96-B14D66390700", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", matchCriteriaId: "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF105508-6252-4101-92B5-ECA9022D4720", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE83C48-571F-4BD6-ABE3-2B14ED510D13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EAFFAD03-CEE3-4C35-B6D2-627004A22934", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "926812AD-94F0-4CB8-9890-EAB11FDC1804", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9724784-3A56-4175-9829-796CF687CA09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40933267-3CEF-417E-BE95-37B562F37E78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9348AE1-C1F5-4512-9392-4A5971442EA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "181E611F-CC4C-4F72-930D-93C3A85BF2A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8390832E-A389-454A-B8F3-630708DDC9BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.", }, { lang: "es", value: "Una limpieza de memoria insuficiente en AMD Secure Processor (ASP) Trusted Execution Environment (TEE) puede permitir que un atacante autenticado con privilegios genere un TA firmado válido y potencialmente envenenar el contenido de la memoria del proceso con datos controlados por el atacante, lo que resulta en una pérdida de confidencialidad.", }, ], id: "CVE-2021-26393", lastModified: "2024-11-21T05:56:17.503", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-09T21:15:12.607", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:34
Severity ?
Summary
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
psirt@amd.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | radeon_rx_vega_m_firmware | * | |
intel | core_i5-8305g | - | |
intel | core_i7-8705g | - | |
intel | core_i7-8706g | - | |
intel | core_i7-8709g | - | |
intel | nuc_8_enthusiast_nuc8i7hnkqc | - | |
intel | nuc_8_enthusiast_nuc8i7hvkva | - | |
intel | nuc_8_enthusiast_nuc8i7hvkvaw | - | |
intel | nuc_kit_nuc8i7hnk | - | |
intel | nuc_kit_nuc8i7hvk | - | |
amd | radeon_software | * | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_7600 | - | |
amd | radeon_rx_7600m | - | |
amd | radeon_rx_7600m_xt | - | |
amd | radeon_rx_7600s | - | |
amd | radeon_rx_7700_xt | - | |
amd | radeon_rx_7700s | - | |
amd | radeon_rx_7800_xt | - | |
amd | radeon_rx_7900_gre | - | |
amd | radeon_rx_7900_xt | - | |
amd | radeon_rx_7900_xtx | - | |
amd | radeon_rx_7900m | - | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_pro_w7500 | - | |
amd | radeon_pro_w7600 | - | |
amd | radeon_pro_w7800 | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | radeon_pro_vega_56_firmware | - | |
amd | radeon_pro_vega_56 | - | |
amd | radeon_pro_vega_64_firmware | - | |
amd | radeon_pro_vega_64 | - | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | ryzen_3_3015ce | - | |
amd | ryzen_3_3015e | - | |
amd | ryzen_3_4100 | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_4500 | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600hs | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_4680u | - | |
amd | ryzen_5_5500h | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_pro_3200g | - | |
amd | ryzen_5_pro_3200ge | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800hs | - | |
amd | ryzen_7_4980u | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_4900hs | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4", versionEndExcluding: "23.10.01.46", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", matchCriteriaId: "F4D55B9D-4BAB-4082-A33F-626E15229333", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", matchCriteriaId: "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", matchCriteriaId: "F423BBE6-327A-40DC-8BCE-BF43600A68D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", matchCriteriaId: "08718840-D468-4E86-8FFF-A2B1841E6BF6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1A4CCCB-01CC-4488-9336-C0C379ABE609", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*", matchCriteriaId: "F2C17AD1-F813-484D-AC73-4A9BBCE233BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", matchCriteriaId: "C95A2886-F2CC-45A3-8877-AE894FF86898", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", matchCriteriaId: "244CD6EC-780A-405E-8CFA-666A666FF7D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", matchCriteriaId: "1D391590-652D-4B98-89F1-9F31F479448B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135", versionEndExcluding: "23.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467", versionEndExcluding: "23.q3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "52880029-7A09-47F5-84B9-7A8A77D883F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "2819B30C-7A03-4A3B-8D34-080A85E83AE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40A38A14-D45C-4746-BCDC-D26D178B1426", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "4D89E1B8-509D-428E-984C-E23D808A0006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135", versionEndExcluding: "23.7.1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467", versionEndExcluding: "23.q3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*", matchCriteriaId: "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*", matchCriteriaId: "7774C021-B18A-473A-90B5-48A95071E5BA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*", matchCriteriaId: "263E53BD-7A57-40AC-8A35-D761BD3895A5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", matchCriteriaId: "E02A9C95-DF12-4816-88C3-6AFC331B8426", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*", matchCriteriaId: "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", matchCriteriaId: "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", matchCriteriaId: "CDA92163-5A72-4271-89D4-401C24950F62", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "510FB098-A28C-46AD-9244-438DC828A007", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", matchCriteriaId: "954500F1-6466-4A1C-8E0C-D759121CEBDC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", matchCriteriaId: "73A4079E-01E9-4807-A293-F6E843752554", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "9048FE84-62DA-4C1F-9EF2-0E94A10D116F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "0D111819-345A-4BAF-83D0-1153209AFCEB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", matchCriteriaId: "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", matchCriteriaId: "0D70D28B-809E-456C-96ED-84A4CA7EC942", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "444F83B8-ABD0-401C-8028-CAF0DEECF7BB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", matchCriteriaId: "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", matchCriteriaId: "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C5F418C-2989-44C0-A880-A7BBA067E581", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n", }, { lang: "es", value: "Una verificación de límites insuficiente en el ASP (AMD Secure Processor) puede permitir que un atacante acceda a la memoria fuera de los límites de lo permitido para una TA (Trusted Application), lo que resulta en una posible denegación de servicio.", }, ], id: "CVE-2021-46748", lastModified: "2024-11-21T06:34:37.687", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:10.267", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Severity ?
Summary
An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | - | |
amd | athlon_3050ge_firmware | - | |
amd | athlon_3050ge | - | |
amd | athlon_3150g_firmware | - | |
amd | athlon_3150g | - | |
amd | athlon_3150ge_firmware | - | |
amd | athlon_3150ge | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | - | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | - | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*", matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB1639FB-C5B9-4DC6-9758-43C628914D8C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*", matchCriteriaId: "A394396F-CED4-4A52-ACA2-A0B74A1AE97E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*", matchCriteriaId: "B233FD6C-2F8A-4542-B353-3E7B6D77CD94", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8F810170-5792-4C69-9D0A-DC9422CB3D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*", matchCriteriaId: "6678421F-CD05-445F-B114-293609732777", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CBA86063-6EE8-446E-BCE1-210B0699103B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6512668F-EEFB-4654-AE7F-9F71F89F3B65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", matchCriteriaId: "6AC4BECA-6023-4225-9685-937E47C67C1F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8198CED9-216C-4573-B766-B6CDB3E6F7CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", matchCriteriaId: "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8650BE66-7694-4DD9-94E5-73A7DD0A124D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", matchCriteriaId: "94AB5202-A5A2-479E-B4B0-347C823201AD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B75781D-051F-44C1-B79F-1C32AFECFF65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D7F33C-F522-4A20-9055-1662178D7F27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2093BCDB-70F3-4D90-B899-B2801F8A6059", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27CDB416-B093-4871-8142-1D7EB5BF90B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", matchCriteriaId: "52C9FEEF-0D0F-40DC-9E98-248F8608B755", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", matchCriteriaId: "3964CA7C-996C-43C5-B1A5-14046DAD07BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5454A72B-76EC-46D9-8675-97DC076D7615", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54611A05-BCA3-495A-8CDB-946FF47E0333", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3CC4654E-519B-4412-B551-F2436108152B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "38997E8B-D2B7-4AB2-BB6E-33966511AF38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.", }, { lang: "es", value: "Un atacante, que haya obtenido altos privilegios por algún otro tipo de vulnerabilidad, puede ser capaz de leer los datos de la ROM de arranque, resultando en una pérdida de la integridad del sistema", }, ], id: "CVE-2021-26366", lastModified: "2024-11-21T05:56:13.280", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 3.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-12T18:16:53.217", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Severity ?
Summary
Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.", }, { lang: "es", value: "Una lectura y escritura fuera de límites en AMD Graphics Driver para Windows 10 en Escape 0x6002d03 puede conllevar a una escalada de privilegios o una denegación de servicio", }, ], id: "CVE-2020-12903", lastModified: "2024-11-21T05:00:31.920", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T20:15:19.603", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Severity ?
Summary
A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | athlon_3050ge_firmware | - | |
amd | athlon_3050ge | - | |
amd | athlon_3150ge_firmware | - | |
amd | athlon_3150ge | - | |
amd | athlon_3150g_firmware | - | |
amd | athlon_3150g | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | - | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | - | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*", matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB1639FB-C5B9-4DC6-9758-43C628914D8C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*", matchCriteriaId: "A394396F-CED4-4A52-ACA2-A0B74A1AE97E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8F810170-5792-4C69-9D0A-DC9422CB3D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*", matchCriteriaId: "6678421F-CD05-445F-B114-293609732777", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*", matchCriteriaId: "B233FD6C-2F8A-4542-B353-3E7B6D77CD94", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6512668F-EEFB-4654-AE7F-9F71F89F3B65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", matchCriteriaId: "6AC4BECA-6023-4225-9685-937E47C67C1F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8198CED9-216C-4573-B766-B6CDB3E6F7CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", matchCriteriaId: "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B75781D-051F-44C1-B79F-1C32AFECFF65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D7F33C-F522-4A20-9055-1662178D7F27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2093BCDB-70F3-4D90-B899-B2801F8A6059", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.", }, { lang: "es", value: "Un atacante podría usar una aplicación de usuario (UApp) o un cargador de arranque AGESA (ABL) maliciosos o comprometidos para extraer memoria arbitraria del cargador de arranque de la fase 2 de ASP, conllevando potencialmente a una divulgación de información", }, ], id: "CVE-2021-26361", lastModified: "2024-11-21T05:56:12.447", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-12T18:16:53.147", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Severity ?
Summary
Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.", }, { lang: "es", value: "El desbordamiento de Pool/Pila en AMD Graphics Driver para Windows 10 en el escape 0x110037 puede conllevar a una escalada de privilegios, una divulgación de información o una denegación de servicio", }, ], id: "CVE-2020-12895", lastModified: "2024-11-21T05:00:30.937", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T16:15:09.077", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 19:15
Modified
2024-11-21 05:00
Severity ?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, { lang: "es", value: "Un desbordamiento del búfer de pila en AMD Graphics Driver para Windows 10 puede conllevar a una escalada de privilegios o una denegación de servicio", }, ], id: "CVE-2020-12898", lastModified: "2024-11-21T05:00:31.200", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T19:15:07.233", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Severity ?
Summary
An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.", }, { lang: "es", value: "Una vulnerabilidad de escritura arbitraria en AMD Radeon Graphics Driver para Windows 10 permite potencialmente a usuarios no privilegiados conseguir una escalada de privilegios y causar una denegación de servicio", }, ], id: "CVE-2020-12900", lastModified: "2024-11-21T05:00:31.463", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T16:15:09.230", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-05-12 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_5300g_firmware | - | |
amd | ryzen_5300g | - | |
amd | ryzen_5300ge_firmware | - | |
amd | ryzen_5300ge | - | |
amd | ryzen_5600g_firmware | - | |
amd | ryzen_5600g | - | |
amd | ryzen_5600ge_firmware | - | |
amd | ryzen_5600ge | - | |
amd | ryzen_5600x_firmware | - | |
amd | ryzen_5600x | - | |
amd | ryzen_5700g_firmware | - | |
amd | ryzen_5700g | - | |
amd | ryzen_5700ge_firmware | - | |
amd | ryzen_5700ge | - | |
amd | athlon_3050ge_firmware | - | |
amd | athlon_3050ge | - | |
amd | athlon_3150g_firmware | - | |
amd | athlon_3150g | - | |
amd | athlon_3150ge_firmware | - | |
amd | athlon_3150ge | - | |
amd | ryzen_5800x_firmware | - | |
amd | ryzen_5800x | - | |
amd | ryzen_5800x3d_firmware | - | |
amd | ryzen_5800x3d | - | |
amd | ryzen_5900x_firmware | - | |
amd | ryzen_5900x | - | |
amd | ryzen_5950x_firmware | - | |
amd | ryzen_5950x | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | - | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | - | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*", matchCriteriaId: "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E61E04BD-4B95-4513-B832-30DF5332B77E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", matchCriteriaId: "FEA61ADB-2FEA-459A-BF4F-C55401479107", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "833B79C9-7F23-4CDB-8B9B-3699E43B9AE4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "3D857EFE-B24E-4228-BB1E-34F9BC763A11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5300ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "74FA8650-B46B-4034-85DA-AC568B517D37", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F6CC472B-1502-402D-B2AC-8A63A69F2A27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5600g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "80F2BF6E-E3B0-456D-ABC1-A8687C6E8CA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "8937FABB-B60E-4780-BB6D-B1B99DD69219", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5600ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D32F62EA-D89E-4F30-8ABA-4887EC82EEF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "58F07C72-3C8F-493D-A94E-4FEDD43936D2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A60E8FD3-F6E4-42FB-96C3-B07D597560AE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B93E2C9E-66AA-433B-ADB8-A6AD4F0C9A80", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1A9BEC-27AB-40AD-BBED-4420451D3793", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CB1639FB-C5B9-4DC6-9758-43C628914D8C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*", matchCriteriaId: "A394396F-CED4-4A52-ACA2-A0B74A1AE97E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*", matchCriteriaId: "B233FD6C-2F8A-4542-B353-3E7B6D77CD94", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8F810170-5792-4C69-9D0A-DC9422CB3D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*", matchCriteriaId: "6678421F-CD05-445F-B114-293609732777", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34D0CF3A-54CC-42A0-9075-6923EB3023A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*", matchCriteriaId: "48F6B331-4C0F-49FF-A39F-381B9ADE3483", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5800x3d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "888D3667-BBD7-45E5-BA38-37D0A007408D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "238EA54F-4809-4D8F-9F18-71135FED9D05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4E11988B-5467-4585-9A95-AD3C7E0480F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*", matchCriteriaId: "050C802C-D8C7-4D58-BA6E-AC48EEF25215", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7522E8A-74E4-42D8-9B6C-DD1FB6C4CE65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*", matchCriteriaId: "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53240910-3F88-465C-A0CD-A98395A05756", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED8BD87-468E-4953-96B1-CF923985B963", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F23104CA-40BB-497E-809E-B89BDBB8B844", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", matchCriteriaId: "A468A5E6-BCFA-4141-955E-D7AFE1737913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "808C582D-4F80-4378-B177-012EEF438443", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1031085D-AD15-4124-803E-9B742E7484A0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30C5C135-D432-4AEC-BB40-01FDA6A6E995", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", matchCriteriaId: "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "32B01772-B9AB-4724-BC36-C707E01C9EDB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4F55EF-4F2B-499C-8173-12BE32085744", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27CDB416-B093-4871-8142-1D7EB5BF90B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", matchCriteriaId: "52C9FEEF-0D0F-40DC-9E98-248F8608B755", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", matchCriteriaId: "3964CA7C-996C-43C5-B1A5-14046DAD07BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5454A72B-76EC-46D9-8675-97DC076D7615", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", matchCriteriaId: "978DF75D-F7B7-40F6-8054-9551306106F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7AE0210-F156-42BA-AAD5-177A2E845A4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", matchCriteriaId: "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", matchCriteriaId: "5D1A55FE-F144-494E-BCF0-7E367DA56E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "73A86733-31A4-4146-9539-01883B0D315A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "85D99997-1389-493E-BDEA-9904A46E48EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57E61614-68FD-437A-8037-801E0663CBD8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "F3D16B66-A4EC-422D-856A-A862ECE13FBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54611A05-BCA3-495A-8CDB-946FF47E0333", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", matchCriteriaId: "E38E22B3-AAAF-4075-9DEB-5198A8283E15", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", matchCriteriaId: "B08A5CCF-054C-450B-93FC-8A3A4577CA00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3CC4654E-519B-4412-B551-F2436108152B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", matchCriteriaId: "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "38997E8B-D2B7-4AB2-BB6E-33966511AF38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", matchCriteriaId: "6B99E921-4023-4E28-BAB7-A830487B3850", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", matchCriteriaId: "51BD2B6B-A491-4430-ACDA-019C8E1D0348", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CBA86063-6EE8-446E-BCE1-210B0699103B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B75781D-051F-44C1-B79F-1C32AFECFF65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D7F33C-F522-4A20-9055-1662178D7F27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78AB5531-B88E-478C-A723-ADAE3E0C87F3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", matchCriteriaId: "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2093BCDB-70F3-4D90-B899-B2801F8A6059", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F24782C-DBE2-488F-B935-49B4A8BC1E29", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", matchCriteriaId: "9825AB7C-7675-4364-BCE3-4C63BD41780A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", matchCriteriaId: "937E2FA2-BED8-48FF-8D01-153D4039F224", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E6788A3F-6731-4529-AAFF-3CB893C0D07B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56C52-6200-47CD-A722-28A1437050B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "13AB11C7-28F2-41AF-85D4-F391E02797A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8DC33A3B-F40D-4532-AA66-4E23360F94E2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "337E685C-4B65-441C-AD06-E8374CC39450", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", matchCriteriaId: "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C9669B2E-9590-4521-AC69-E7F5F201CAA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", matchCriteriaId: "45C1A897-5FA2-403D-86C2-9D67C5B043A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5E5F3921-FA39-4896-8546-DE603A70374A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", matchCriteriaId: "99BEE640-381F-449B-ACB1-F1BD255683C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6512668F-EEFB-4654-AE7F-9F71F89F3B65", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", matchCriteriaId: "6AC4BECA-6023-4225-9685-937E47C67C1F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "031C2DA9-0E24-450C-B57A-DC7C519D5F47", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", matchCriteriaId: "88D2C602-8086-4FC4-AE89-0842A453E56E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8198CED9-216C-4573-B766-B6CDB3E6F7CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", matchCriteriaId: "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5AC21C1E-D4E7-424F-A284-BBE94194B43C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "AF3EDC73-2517-4EBF-B160-85266304D866", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8650BE66-7694-4DD9-94E5-73A7DD0A124D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", matchCriteriaId: "94AB5202-A5A2-479E-B4B0-347C823201AD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", matchCriteriaId: "E9B07D45-5EA5-405E-A649-DADE2451E3EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", matchCriteriaId: "09342618-057F-4F49-A43F-352212738F80", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F5898533-4CDE-496C-99A8-361F8C8E5A85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B4DA33B2-B942-447F-9229-A41808411F38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "91D4E46F-20BB-46BE-A36F-826E2A15E931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", matchCriteriaId: "BAED3E10-E29A-41E8-9758-C0DEEB13D630", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F3C4424D-70E5-4101-B39C-15EEC4E933BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF14DD9D-3906-4E4F-804E-00B41525285C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "7C215E52-0E0C-42F5-9140-8313E847A2FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98831A6B-A51F-48A9-80D7-B903A4F0A936", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", matchCriteriaId: "962E91F5-037B-4532-A5DB-FCC01631666F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.", }, { lang: "es", value: "Una falta de verificación del protocolo en el SMM podría permitir a un atacante controlar el protocolo y modificar la flash SPI, resultando en una potencial ejecución de código arbitrario", }, ], id: "CVE-2021-26317", lastModified: "2024-11-21T05:56:05.107", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-05-12T19:15:48.070", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Severity ?
Summary
AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "00350248-7850-480A-BACF-89DC9194F34E", versionEndExcluding: "21.4.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).", }, { lang: "es", value: "AMD Graphics Driver para Windows 10, amdfender.sys puede manejar incorrectamente la comprobación de entrada en InputBuffer, lo que puede resultar en una denegación de servicio (DoS)", }, ], id: "CVE-2020-12960", lastModified: "2024-11-21T05:00:35.200", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T20:15:19.697", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Severity ?
Summary
Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.", }, { lang: "es", value: "Una escalada de privilegios por Disminución Arbitraria en AMD Graphics Driver para Windows 10 puede conllevar a una escalada de privilegios o una denegación de servicio", }, ], id: "CVE-2020-12902", lastModified: "2024-11-21T05:00:31.750", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T16:15:09.280", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:41
Severity ?
5.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6750_gre | - | |
amd | radeon_rx_6750_xt | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_software | * | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6800 | - | |
amd | ryzen_9_5980hx_firmware | * | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_3_3300u_firmware | * | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3350u_firmware | * | |
amd | ryzen_3_3350u | - | |
amd | ryzen_5_3450u_firmware | * | |
amd | ryzen_5_3450u | - | |
amd | ryzen_5_3500u_firmware | * | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3500c_firmware | * | |
amd | ryzen_5_3500c | - | |
amd | ryzen_5_3550h_firmware | * | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | * | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_3700u_firmware | * | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700c_firmware | * | |
amd | ryzen_7_3700c | - | |
amd | ryzen_7_3750h_firmware | * | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | * | |
amd | ryzen_7_3780u | - | |
amd | athlon_gold_3150c_firmware | * | |
amd | athlon_gold_3150c | - | |
amd | athlon_gold_3150u_firmware | * | |
amd | athlon_gold_3150u | - | |
amd | athlon_pro_3145b_firmware | * | |
amd | athlon_pro_3145b | - | |
amd | athlon_silver_3050c_firmware | * | |
amd | athlon_silver_3050c | - | |
amd | athlon_silver_3050u_firmware | * | |
amd | athlon_silver_3050u | - | |
amd | athlon_pro_3045b_firmware | * | |
amd | athlon_pro_3045b | - | |
amd | athlon_silver_3050e_firmware | * | |
amd | athlon_silver_3050e | - | |
amd | athlon_gold_pro_3150g_firmware | * | |
amd | athlon_gold_pro_3150g | - | |
amd | athlon_gold_3150g_firmware | * | |
amd | athlon_gold_3150g | - | |
amd | athlon_gold_pro_3150ge_firmware | * | |
amd | athlon_gold_pro_3150ge | - | |
amd | athlon_pro_300ge_firmware | * | |
amd | athlon_pro_300ge | - | |
amd | ryzen_3_4300ge_firmware | * | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_5_4600ge_firmware | * | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_7_4700ge_firmware | * | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_3_4300g_firmware | * | |
amd | ryzen_3_4300g | - | |
amd | ryzen_5_4600g_firmware | * | |
amd | ryzen_5_4600g | - | |
amd | ryzen_7_4700g_firmware | * | |
amd | ryzen_7_4700g | - | |
amd | ryzen_3_5300ge_firmware | * | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300g_firmware | * | |
amd | ryzen_3_5300g | - | |
amd | ryzen_5_5600ge_firmware | * | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600g_firmware | * | |
amd | ryzen_5_5600g | - | |
amd | ryzen_7_5700ge_firmware | * | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700g_firmware | * | |
amd | ryzen_7_5700g | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "F71B3286-B679-4DC0-BDD1-784AC5577094", versionEndExcluding: "23.12.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*", matchCriteriaId: "49540C5D-CEC7-4BCB-882B-73843CAFD55A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "4397FD7C-3357-4F01-98F4-131000D23AA0", versionEndIncluding: "23.q4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1EFDD49-95E7-4E92-A476-9F7E9D2B222A", versionEndExcluding: "cezannepi-fp6_1.0.0.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", matchCriteriaId: "9921AE2D-F497-47C8-B463-947E230CF4F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "799912F4-2A5D-41F6-B645-5972B966617B", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", matchCriteriaId: "2452A625-5B59-49DF-A3C3-872642181E9D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1D7DEDAC-51F3-4B72-8958-72CFDB8572A0", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*", matchCriteriaId: "533144EB-802F-496D-8C09-15AEA537F89B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", matchCriteriaId: "DCDAE070-C41A-4D8C-BE0D-DBD434760749", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*", matchCriteriaId: "5B16B55B-11B3-43DB-860A-62CD3020B536", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "15FE9FAE-DEC6-42FA-8622-3D5B0C845928", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", matchCriteriaId: "A8C6F103-30CC-4738-B489-B12790836B1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3770F180-FB7C-410F-B49D-D30AA05326BC", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2EC993-8A65-416B-939F-1C707D596AF9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", matchCriteriaId: "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF809F01-E6B3-4975-AC8B-EE2FDD199B14", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*", matchCriteriaId: "0C03B5C8-9337-422B-9474-08EBBD0E0A45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", matchCriteriaId: "228E3FBD-F997-402D-AE96-B14D66390700", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", matchCriteriaId: "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F2AC7D6-47AB-4178-9585-34293B36F576", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*", matchCriteriaId: "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", matchCriteriaId: "57E11A9D-03EC-4014-BB1C-5286C694581B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C05D78A9-2CED-4BA1-8382-BC8D722E91D9", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*", matchCriteriaId: "9E514E0C-397F-4DF3-AD79-D7C800BAA28A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8233A5D0-7796-4164-99CF-BB23B74563DF", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*", matchCriteriaId: "FEE30066-A56C-4997-BED2-FEB4F61D9F09", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03194384-10A2-4B6D-BED1-C01908249969", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", matchCriteriaId: "6CFF28BE-F049-4716-AADE-643FABB753A7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03BCFD6B-04D1-4A27-AB06-90F8BA894E2C", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*", matchCriteriaId: "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "754DE9E2-F441-4D7F-BDAB-6ADED0F9D76A", versionEndExcluding: "picassopi-fp5_1.0.0.e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*", matchCriteriaId: "951CA892-BAE2-46A4-BC86-0A205A4FA218", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A192415A-41F1-4DF9-A351-A6E879E45431", versionEndExcluding: "comboam4pi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*", matchCriteriaId: "EE0FB0AF-E942-4257-A9F2-8077A753A169", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "76F10B69-9959-4977-893B-076BFBAC1BA6", versionEndExcluding: "comboam4pi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*", matchCriteriaId: "6AE68ECE-5298-4BC1-AC24-5CF613389CDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7217BA72-D101-49C1-86B7-A63BFA01A056", versionEndExcluding: "comboam4pi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*", matchCriteriaId: "E09DC414-96EE-478E-847C-7ACB5915659B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "045D34B9-50A3-453D-A9E1-64180D1E1B5C", versionEndExcluding: "comboam4pi_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "6F521757-7ABC-4CEB-AD06-2FD738216E8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C52E5C9A-DC2E-428F-97CF-61C7340C0579", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "62AB8A11-9C17-4528-A582-8340964C76A7", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E240139-34E9-4D68-AEBB-6E641C75AB82", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B184CA4-DA2E-4EF7-997C-BA563CB41A08", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40EDD65C-1101-4F0C-AD08-007A97D7184E", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6DCE8037-1ED8-468A-9FBF-B79809A8089A", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2201670-E611-4C1E-BD06-E2B4262C3687", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7B0598FA-5EB7-41FF-AC46-BFBCE1EA1271", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C51F223-5529-4D10-A7AF-44198DE58684", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35C8C0CE-AA13-434D-83BD-2DA454B1937C", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E5A8225E-A53A-4602-ACF6-F142D1CCF9FD", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BF3486C1-EAD5-4861-8463-506D59A5F7DA", versionEndExcluding: "comboam4v2_pi_1.2.0.5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.", }, { lang: "es", value: "Un atacante malicioso en x86 puede configurar mal las regiones de memoria confiable (TMR), lo que puede permitirle establecer un rango de direcciones arbitrario para la TMR, lo que podría provocar una pérdida de integridad y disponibilidad.", }, ], id: "CVE-2021-26367", lastModified: "2024-12-12T20:41:56.120", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.7, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 5.2, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-13T17:15:17.360", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html", }, { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Severity ?
Summary
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_pro_software | * | |
amd | radeon_software | * | |
microsoft | windows_10 | - | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*", matchCriteriaId: "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766", versionEndExcluding: "21.q1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "528B8908-B68E-40A1-9EB8-8EBD287DC8F2", versionEndExcluding: "20.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", matchCriteriaId: "084984D5-D241-497B-B118-50C6C1EAD468", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", matchCriteriaId: "BA592626-F17C-4F46-823B-0947D102BBD2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.", }, { lang: "es", value: "Una vulnerabilidad de divulgación de información de dirección de grupo de kernel/fuga de pila en el controlador de gráficos AMD para Windows 10 puede conllevar a una omisión de KASLR", }, ], id: "CVE-2020-12987", lastModified: "2024-11-21T05:00:37.227", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-06-11T22:15:11.570", references: [ { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Severity ?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | radeon_software | * | |
microsoft | windows_10 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*", matchCriteriaId: "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9", versionEndExcluding: "20.11.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.", }, { lang: "es", value: "Una lectura fuera de límites en AMD Graphics Driver for Windows 10 en Escape 0x3004203 puede conllevar a una divulgación de información arbitraria", }, ], id: "CVE-2020-12904", lastModified: "2024-11-21T05:00:32.063", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-15T16:15:09.330", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
psirt@amd.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | radeon_rx_vega_m_firmware | * | |
intel | core_i5-8305g | - | |
intel | core_i7-8705g | - | |
intel | core_i7-8706g | - | |
intel | core_i7-8709g | - | |
intel | nuc_8_enthusiast_nuc8i7hnkqc | - | |
intel | nuc_8_enthusiast_nuc8i7hvkva | - | |
intel | nuc_8_enthusiast_nuc8i7hvkvaw | - | |
intel | nuc_kit_nuc8i7hnk | - | |
intel | nuc_kit_nuc8i7hvk | - | |
amd | radeon_software | * | |
amd | radeon_rx_5300 | - | |
amd | radeon_rx_5300_xt | - | |
amd | radeon_rx_5300m | - | |
amd | radeon_rx_5500 | - | |
amd | radeon_rx_5500_xt | - | |
amd | radeon_rx_5500m | - | |
amd | radeon_rx_5600 | - | |
amd | radeon_rx_5600_xt | - | |
amd | radeon_rx_5600m | - | |
amd | radeon_rx_5700 | - | |
amd | radeon_rx_5700_xt | - | |
amd | radeon_rx_5700m | - | |
amd | radeon_rx_6300m | - | |
amd | radeon_rx_6400 | - | |
amd | radeon_rx_6450m | - | |
amd | radeon_rx_6500_xt | - | |
amd | radeon_rx_6500m | - | |
amd | radeon_rx_6550m | - | |
amd | radeon_rx_6550s | - | |
amd | radeon_rx_6600 | - | |
amd | radeon_rx_6600_xt | - | |
amd | radeon_rx_6600m | - | |
amd | radeon_rx_6600s | - | |
amd | radeon_rx_6650_xt | - | |
amd | radeon_rx_6650m | - | |
amd | radeon_rx_6650m_xt | - | |
amd | radeon_rx_6700 | - | |
amd | radeon_rx_6700_xt | - | |
amd | radeon_rx_6700m | - | |
amd | radeon_rx_6700s | - | |
amd | radeon_rx_6800 | - | |
amd | radeon_rx_6800_xt | - | |
amd | radeon_rx_6800m | - | |
amd | radeon_rx_6800s | - | |
amd | radeon_rx_6850m_xt | - | |
amd | radeon_rx_6900_xt | - | |
amd | radeon_rx_6950_xt | - | |
amd | radeon_rx_7600 | - | |
amd | radeon_rx_7600m | - | |
amd | radeon_rx_7600m_xt | - | |
amd | radeon_rx_7600s | - | |
amd | radeon_rx_7700_xt | - | |
amd | radeon_rx_7700s | - | |
amd | radeon_rx_7800_xt | - | |
amd | radeon_rx_7900_gre | - | |
amd | radeon_rx_7900_xt | - | |
amd | radeon_rx_7900_xtx | - | |
amd | radeon_rx_7900m | - | |
amd | radeon_software | * | |
amd | radeon_pro_w5500 | - | |
amd | radeon_pro_w5500x | - | |
amd | radeon_pro_w5700 | - | |
amd | radeon_pro_w5700x | - | |
amd | radeon_pro_w6300 | - | |
amd | radeon_pro_w6300m | - | |
amd | radeon_pro_w6400 | - | |
amd | radeon_pro_w6500m | - | |
amd | radeon_pro_w6600 | - | |
amd | radeon_pro_w6600m | - | |
amd | radeon_pro_w6600x | - | |
amd | radeon_pro_w6800 | - | |
amd | radeon_pro_w6800x | - | |
amd | radeon_pro_w6800x_duo | - | |
amd | radeon_pro_w6900x | - | |
amd | radeon_pro_w7500 | - | |
amd | radeon_pro_w7600 | - | |
amd | radeon_pro_w7800 | - | |
amd | radeon_rx_vega_56_firmware | - | |
amd | radeon_rx_vega_56 | - | |
amd | radeon_rx_vega_64_firmware | - | |
amd | radeon_rx_vega_64 | - | |
amd | radeon_pro_vega_56_firmware | - | |
amd | radeon_pro_vega_56 | - | |
amd | radeon_pro_vega_64_firmware | - | |
amd | radeon_pro_vega_64 | - | |
amd | radeon_software | * | |
amd | radeon_software | * | |
amd | ryzen_3_3015ce | - | |
amd | ryzen_3_3015e | - | |
amd | ryzen_3_4100 | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_5_4500 | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600hs | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_4680u | - | |
amd | ryzen_5_5500h | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_pro_3200g | - | |
amd | ryzen_5_pro_3200ge | - | |
amd | ryzen_5_pro_3350g | - | |
amd | ryzen_5_pro_3350ge | - | |
amd | ryzen_5_pro_3400g | - | |
amd | ryzen_5_pro_3400ge | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800hs | - | |
amd | ryzen_7_4980u | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_4900hs | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4", versionEndExcluding: "23.10.01.46", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", matchCriteriaId: "F4D55B9D-4BAB-4082-A33F-626E15229333", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", matchCriteriaId: "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", matchCriteriaId: "F423BBE6-327A-40DC-8BCE-BF43600A68D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", matchCriteriaId: "08718840-D468-4E86-8FFF-A2B1841E6BF6", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1A4CCCB-01CC-4488-9336-C0C379ABE609", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*", matchCriteriaId: "F2C17AD1-F813-484D-AC73-4A9BBCE233BB", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", matchCriteriaId: "C95A2886-F2CC-45A3-8877-AE894FF86898", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", matchCriteriaId: "244CD6EC-780A-405E-8CFA-666A666FF7D5", vulnerable: false, }, { criteria: "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", matchCriteriaId: "1D391590-652D-4B98-89F1-9F31F479448B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135", versionEndExcluding: "23.7.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", matchCriteriaId: "AB218988-1483-4D96-9075-F79EDBC79974", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467", versionEndExcluding: "23.q3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", matchCriteriaId: "BD8E9065-121A-4220-A631-3B3EB43B2AAB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", matchCriteriaId: "3CE2D18A-955A-4415-A5B2-18258C0277B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "EACFFECA-179B-4911-85DE-D7270610E4A9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", matchCriteriaId: "19588B3D-3F44-4127-8989-B535D4391201", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", matchCriteriaId: "697BB742-0A55-4165-B5BD-5BDCD67B62CD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", matchCriteriaId: "14599A66-17C9-4072-AA0D-EAE86DB496DD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "76F9458D-7D2E-4664-A896-F1FB1907226F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "326A62D7-A59F-4577-A7C4-956E83B5F80E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "52880029-7A09-47F5-84B9-7A8A77D883F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*", matchCriteriaId: "2819B30C-7A03-4A3B-8D34-080A85E83AE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40A38A14-D45C-4746-BCDC-D26D178B1426", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*", matchCriteriaId: "4D89E1B8-509D-428E-984C-E23D808A0006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "538C0130-93FA-4B41-96CE-FEEC462A1135", versionEndExcluding: "23.7.1", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "DA638E10-5A0F-43D5-BC26-5A18C987D467", versionEndExcluding: "23.q3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*", matchCriteriaId: "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*", matchCriteriaId: "7774C021-B18A-473A-90B5-48A95071E5BA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*", matchCriteriaId: "263E53BD-7A57-40AC-8A35-D761BD3895A5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", matchCriteriaId: "2BE6DAAF-7A5E-4D6C-862A-443647E66432", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "492017EE-C13F-4C40-887F-9C3C9F439898", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", matchCriteriaId: "E02A9C95-DF12-4816-88C3-6AFC331B8426", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", matchCriteriaId: "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*", matchCriteriaId: "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", matchCriteriaId: "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", matchCriteriaId: "0005355A-DA7A-417D-8AF9-F6CC880040BC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "1614C8C2-0DDF-464F-BAE5-812CED10CA17", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", matchCriteriaId: "CDA92163-5A72-4271-89D4-401C24950F62", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "510FB098-A28C-46AD-9244-438DC828A007", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", matchCriteriaId: "954500F1-6466-4A1C-8E0C-D759121CEBDC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", matchCriteriaId: "73A4079E-01E9-4807-A293-F6E843752554", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", matchCriteriaId: "C212F6CE-1920-44DC-AC13-4922A052CEBB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*", matchCriteriaId: "9048FE84-62DA-4C1F-9EF2-0E94A10D116F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*", matchCriteriaId: "0D111819-345A-4BAF-83D0-1153209AFCEB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", matchCriteriaId: "3D242085-9B1A-4125-8070-50505531EECE", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", matchCriteriaId: "055F87B8-FD74-44CC-A063-84E0BA2E8136", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", matchCriteriaId: "43C5E75B-136B-4A60-9C2C-84D9C78C0453", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2C6A9017-FE60-4087-AA9D-AFB4E444E884", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", matchCriteriaId: "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "2D640C5C-C906-41A2-96BC-19299ADB9446", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", matchCriteriaId: "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", matchCriteriaId: "0D70D28B-809E-456C-96ED-84A4CA7EC942", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "444F83B8-ABD0-401C-8028-CAF0DEECF7BB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", matchCriteriaId: "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", matchCriteriaId: "56772AAA-A5A9-4125-B4DB-939D583DA8E5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", matchCriteriaId: "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C5F418C-2989-44C0-A880-A7BBA067E581", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\n", }, { lang: "es", value: "La verificación inadecuada de la firma del controlador RadeonTM RX Vega M Graphics para Windows puede permitir que un atacante con privilegios de administrador inicie AMDSoftwareInstaller.exe sin validar la firma del archivo, lo que podría provocar la ejecución de código arbitrario.", }, ], id: "CVE-2023-20567", lastModified: "2024-11-21T07:41:08.253", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:15.880", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-347", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }