Vulnerabilites related to amd - ryzen_pro_7945_firmware
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
Summary
Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2BB2976-40B7-453F-8569-A55498163B8A", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*", matchCriteriaId: "8576A19F-AC8F-457B-8EA5-651B552ED0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D53AACA-360B-477C-A3A8-30575F8A4434", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0A553B39-2550-4E53-847E-E2EF70F0EED5", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A7BCE6E4-B1F5-421B-932F-20E035F5655D", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0711A972-5E88-448E-9586-98F8017F08B0", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33D2C3BA-7A30-49D8-8BAD-4C2010260B7D", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9691D81C-ADE3-4FE3-9EC7-9D994FDBA08F", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6EEF80D5-DFA2-4751-A1F7-E769D7D4B46D", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AF726744-1ED4-41A1-A118-F770060B3EB3", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8BF62DE-E6C3-44D6-A6CA-A7569C0028C9", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", matchCriteriaId: "1232B034-1214-4F9A-823D-DC76D5C5956B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34C1601D-0D8F-4999-96E5-9F18C103E7D6", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "6740A06F-4512-427D-9CB9-A4A6DB046BA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79FE13D8-9892-40FF-9578-012A902BB809", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6C05D51F-469D-487D-9FC8-E1AD699A6F74", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F808006D-E334-4056-BB6E-721CE8E6C3A5", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", matchCriteriaId: "76121981-8DC2-4779-833E-4B15CFCF7FC3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "16C0B50B-2174-4A65-A02C-C61DF824642B", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", matchCriteriaId: "225E8405-04FF-4885-92C8-8581ACC66E06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2709A848-FD96-415C-88A9-33B1D3D6A0D8", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6CD984-A8C7-4B23-8FF9-896C503EBA37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68946875-089B-46C2-8559-57279CED7AA4", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", matchCriteriaId: "5602B902-9FDB-4946-BE4C-236262285F2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A92815DD-968F-4F2F-A95C-5F1DA5E64B8E", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", matchCriteriaId: "AA666DF3-C5F3-4127-A8EE-B784DD41F642", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C113EB7A-3035-4473-86F8-D40B374F4AD9", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "86CAA682-9666-4929-B1AC-D9DB3109DB1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA564A7C-17C7-4B87-BBB8-C6A582494B16", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", matchCriteriaId: "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "60CEFA0A-6831-4D50-B32B-641EA678E9D4", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "F05C8669-6348-4A1B-B1D4-D22022E1F67E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_3900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39753DB1-4B49-4DF2-A68B-A8C5FE1BB48F", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_3900:-:*:*:*:*:*:*:*", matchCriteriaId: "CB7B70E0-0F62-4472-B89C-5EAC66531A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_7645_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39651B76-7427-4C40-B983-40815CE247C1", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_7645:-:*:*:*:*:*:*:*", matchCriteriaId: "1A46CA03-E0F1-4CAA-9E8E-D7338F8E7020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_7745_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "75043829-195B-420F-95E9-FF0070CED140", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_7745:-:*:*:*:*:*:*:*", matchCriteriaId: "A9BCCAEB-88C6-4D1A-98DE-52DBF5E7C61D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_7945_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7DC58D6-0A95-4DC9-9D95-A11F488883B3", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_7945:-:*:*:*:*:*:*:*", matchCriteriaId: "4A2DE723-9682-45C2-8765-221074EA4327", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21A2BF92-9EDF-4597-B8C6-D64C15C6E68F", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "573DADDC-5D67-4FF1-9859-4D70FE300033", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B51F66F2-2D9C-44C8-AC65-A1B590CB5106", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "754E1DF8-5C97-4ABF-B6DC-04F535E9A185", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39B66D4D-52D0-4FF4-B0C7-97415BB44B40", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7605A06C-780A-4715-A457-542670759B10", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D015E817-C084-485E-A8ED-7009D43CC5E4", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F072C98A-51AE-4B44-BA2F-4E019F0E7325", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "78076025-1D1E-4B99-95FF-245DED79737E", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0674D7D8-5BF6-4C72-BDAC-068191A6A429", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29665F3F-3892-4ADD-BE0A-D42BAD8546D1", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5A4DE59-BD5A-439E-B4FD-C96EC1F89A42", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD374898-A6F3-4E66-A2A5-1D9ED91A4721", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "101053D3-3123-494A-8365-83F89777B57B", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C9F10CF-A540-4457-A85F-375350CA4602", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D6AA2DD-CF5F-4503-8823-7F13F11133D7", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4A0A2D5-C857-47A2-A061-17078E90DF06", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A12F787C-7BFD-4032-AA79-0ECC2C7520F6", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "3674D656-9623-4B39-AADE-158FE70FF29F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4052FC6B-C745-45F7-B4D3-52D477970C7E", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "B21FB338-F944-40F9-8F0C-99B471AAD51E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2D5930F-9DF4-4757-99DE-CFF7425400A1", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "926B633F-103A-4790-A480-572B023EFA03", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6DF6D614-3BE2-430B-A178-CDE9E06FFF83", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", matchCriteriaId: "09B085FF-EAEA-42BC-BA60-3AA9B76141B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1DFD9A4C-2EFD-4BF3-A47E-2B12B64A7B47", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "760F20CC-9034-462C-A25E-C009E2218C38", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E16F2ADD-A6B9-4DF1-A1E9-BCC2D22E2102", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", matchCriteriaId: "1D2CBCEA-AB4F-444C-9CCD-A976003F796C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90B1DD03-461C-4F57-B050-3789FE94B8E9", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", matchCriteriaId: "7D260012-5D8F-4B36-8B88-82DB0291EE9D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8420AEF0-48E3-45B8-B873-B309123BBE4B", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E3F86344-B46A-47C4-AE4F-68D4484060E0", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", matchCriteriaId: "025E494E-953E-426E-BE89-6F2360A3AAC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE2658AC-7355-426D-966F-824E84394BDF", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", matchCriteriaId: "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7736u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F92E9B0-5589-4974-B043-846F14A61E69", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", matchCriteriaId: "5D50E8EA-ECB2-463D-BA51-D13CF5A02266", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7735u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCAE3FBB-E72E-4CD8-808C-73CFA2309388", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", matchCriteriaId: "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1CAE47BF-747E-4B34-88C5-F7F3DA34661E", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", matchCriteriaId: "EE36D471-57BF-4385-A825-029F7313E4DB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7535u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F3DA6321-EBBC-4FD4-9FD1-6FD665CE9EE3", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", matchCriteriaId: "082BE536-F29C-4A73-B030-A19DD3A448B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_7335u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC0B667F-FD5E-4C1A-847A-1B2F45A2D69D", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", matchCriteriaId: "495E436C-B0EE-4B72-AB49-332F4752C140", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E257B95-9956-41FD-80C6-99B7EE381563", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*", matchCriteriaId: "29805A0A-1E52-4545-9D41-B9A1EE571778", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_pro_7940hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B358D4EA-77A1-48B0-BA2A-0A20FBA32B42", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*", matchCriteriaId: "018A02C9-2A5C-43E2-8CCD-4D03C119C22B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_pro_7940h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DE7AEE4B-9C20-4BFA-935A-912AD84C2501", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2BF0B4-1F37-49FB-A700-9E31736FE3B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08D8E4C6-D740-43AD-B0CA-13CA9374CFEA", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8480A7E0-882C-4B03-ADBC-697304B0B7C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7840h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB760DFF-B67E-4BDE-8E74-98C5B6B75169", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*", matchCriteriaId: "2AC94883-E412-4CC9-B3E5-BC5727336746", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7840u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "556B951D-B072-4777-B8A4-BA70480C7008", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840u:-:*:*:*:*:*:*:*", matchCriteriaId: "8E0E7D4C-2E62-4EAE-8CC6-574A72746489", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BB659EC-BBEA-47A1-BD32-4AD0CD428BC4", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0E3657C6-1047-4CA9-8D44-C7143F7D877D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7640h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C43E795E-C271-456B-B323-112664540D52", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640h:-:*:*:*:*:*:*:*", matchCriteriaId: "0E8C8A86-BF92-4BF1-B00E-3B4031FEA460", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7640u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A3C89313-362C-4173-B1E7-3724F8C84668", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640u:-:*:*:*:*:*:*:*", matchCriteriaId: "7F482819-EAEC-47E8-93AF-E38FE7F5B1F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7545u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA9B39AB-2CC9-44AB-9DDB-6C1E632AE3BC", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7545u:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9FED55-880B-47E1-B627-5A2645A47F5F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7540u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AB3F89D3-01FF-4EC9-B34F-6EFFD04B8759", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7540u:-:*:*:*:*:*:*:*", matchCriteriaId: "D82E1AF6-F906-4008-8DF5-F5BD0DF200DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_7440u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4EE38EEB-8DE2-4926-AB2B-E39B7AE923C9", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_7440u:-:*:*:*:*:*:*:*", matchCriteriaId: "E2732E07-F0EA-46FB-AFF6-58B8C581D3C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E2475CD-C586-4280-B631-06313BA4E47E", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*", matchCriteriaId: "C822A153-C32B-423B-8660-EAE0A1DEB4EB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF9574E4-30B3-451B-A9A4-E429CC86ED84", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*", matchCriteriaId: "86704116-43D0-47FD-8896-AB00C265AAE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E257B95-9956-41FD-80C6-99B7EE381563", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*", matchCriteriaId: "29805A0A-1E52-4545-9D41-B9A1EE571778", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.\n\n\n\n\n\n\n\n\n", }, { lang: "es", value: "Las protecciones insuficientes en el código del System Management Mode (SMM) pueden permitir que un atacante habilite potencialmente la escalada de privilegios a través del acceso local.", }, ], id: "CVE-2023-20565", lastModified: "2024-11-21T07:41:07.917", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:15.783", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-269", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
Summary
A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2BB2976-40B7-453F-8569-A55498163B8A", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*", matchCriteriaId: "8576A19F-AC8F-457B-8EA5-651B552ED0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D53AACA-360B-477C-A3A8-30575F8A4434", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0A553B39-2550-4E53-847E-E2EF70F0EED5", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A7BCE6E4-B1F5-421B-932F-20E035F5655D", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0711A972-5E88-448E-9586-98F8017F08B0", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33D2C3BA-7A30-49D8-8BAD-4C2010260B7D", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9691D81C-ADE3-4FE3-9EC7-9D994FDBA08F", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6EEF80D5-DFA2-4751-A1F7-E769D7D4B46D", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AF726744-1ED4-41A1-A118-F770060B3EB3", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8BF62DE-E6C3-44D6-A6CA-A7569C0028C9", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", matchCriteriaId: "1232B034-1214-4F9A-823D-DC76D5C5956B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34C1601D-0D8F-4999-96E5-9F18C103E7D6", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "6740A06F-4512-427D-9CB9-A4A6DB046BA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79FE13D8-9892-40FF-9578-012A902BB809", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6C05D51F-469D-487D-9FC8-E1AD699A6F74", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F808006D-E334-4056-BB6E-721CE8E6C3A5", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", matchCriteriaId: "76121981-8DC2-4779-833E-4B15CFCF7FC3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "16C0B50B-2174-4A65-A02C-C61DF824642B", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", matchCriteriaId: "225E8405-04FF-4885-92C8-8581ACC66E06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2709A848-FD96-415C-88A9-33B1D3D6A0D8", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6CD984-A8C7-4B23-8FF9-896C503EBA37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68946875-089B-46C2-8559-57279CED7AA4", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", matchCriteriaId: "5602B902-9FDB-4946-BE4C-236262285F2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A92815DD-968F-4F2F-A95C-5F1DA5E64B8E", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", matchCriteriaId: "AA666DF3-C5F3-4127-A8EE-B784DD41F642", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C113EB7A-3035-4473-86F8-D40B374F4AD9", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "86CAA682-9666-4929-B1AC-D9DB3109DB1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA564A7C-17C7-4B87-BBB8-C6A582494B16", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", matchCriteriaId: "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "60CEFA0A-6831-4D50-B32B-641EA678E9D4", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "F05C8669-6348-4A1B-B1D4-D22022E1F67E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_3900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39753DB1-4B49-4DF2-A68B-A8C5FE1BB48F", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_3900:-:*:*:*:*:*:*:*", matchCriteriaId: "CB7B70E0-0F62-4472-B89C-5EAC66531A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_7645_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39651B76-7427-4C40-B983-40815CE247C1", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_7645:-:*:*:*:*:*:*:*", matchCriteriaId: "1A46CA03-E0F1-4CAA-9E8E-D7338F8E7020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_7745_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "75043829-195B-420F-95E9-FF0070CED140", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_7745:-:*:*:*:*:*:*:*", matchCriteriaId: "A9BCCAEB-88C6-4D1A-98DE-52DBF5E7C61D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_7945_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7DC58D6-0A95-4DC9-9D95-A11F488883B3", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_7945:-:*:*:*:*:*:*:*", matchCriteriaId: "4A2DE723-9682-45C2-8765-221074EA4327", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21A2BF92-9EDF-4597-B8C6-D64C15C6E68F", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "573DADDC-5D67-4FF1-9859-4D70FE300033", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B51F66F2-2D9C-44C8-AC65-A1B590CB5106", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "754E1DF8-5C97-4ABF-B6DC-04F535E9A185", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39B66D4D-52D0-4FF4-B0C7-97415BB44B40", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7605A06C-780A-4715-A457-542670759B10", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D015E817-C084-485E-A8ED-7009D43CC5E4", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F072C98A-51AE-4B44-BA2F-4E019F0E7325", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "78076025-1D1E-4B99-95FF-245DED79737E", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0674D7D8-5BF6-4C72-BDAC-068191A6A429", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29665F3F-3892-4ADD-BE0A-D42BAD8546D1", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5A4DE59-BD5A-439E-B4FD-C96EC1F89A42", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD374898-A6F3-4E66-A2A5-1D9ED91A4721", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "101053D3-3123-494A-8365-83F89777B57B", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C9F10CF-A540-4457-A85F-375350CA4602", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D6AA2DD-CF5F-4503-8823-7F13F11133D7", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4A0A2D5-C857-47A2-A061-17078E90DF06", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A12F787C-7BFD-4032-AA79-0ECC2C7520F6", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "3674D656-9623-4B39-AADE-158FE70FF29F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4052FC6B-C745-45F7-B4D3-52D477970C7E", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "B21FB338-F944-40F9-8F0C-99B471AAD51E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2D5930F-9DF4-4757-99DE-CFF7425400A1", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "926B633F-103A-4790-A480-572B023EFA03", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6DF6D614-3BE2-430B-A178-CDE9E06FFF83", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", matchCriteriaId: "09B085FF-EAEA-42BC-BA60-3AA9B76141B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1DFD9A4C-2EFD-4BF3-A47E-2B12B64A7B47", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "760F20CC-9034-462C-A25E-C009E2218C38", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E16F2ADD-A6B9-4DF1-A1E9-BCC2D22E2102", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", matchCriteriaId: "1D2CBCEA-AB4F-444C-9CCD-A976003F796C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90B1DD03-461C-4F57-B050-3789FE94B8E9", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", matchCriteriaId: "7D260012-5D8F-4B36-8B88-82DB0291EE9D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8420AEF0-48E3-45B8-B873-B309123BBE4B", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E3F86344-B46A-47C4-AE4F-68D4484060E0", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", matchCriteriaId: "025E494E-953E-426E-BE89-6F2360A3AAC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE2658AC-7355-426D-966F-824E84394BDF", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", matchCriteriaId: "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7736u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F92E9B0-5589-4974-B043-846F14A61E69", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", matchCriteriaId: "5D50E8EA-ECB2-463D-BA51-D13CF5A02266", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7735u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCAE3FBB-E72E-4CD8-808C-73CFA2309388", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", matchCriteriaId: "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1CAE47BF-747E-4B34-88C5-F7F3DA34661E", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", matchCriteriaId: "EE36D471-57BF-4385-A825-029F7313E4DB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7535u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F3DA6321-EBBC-4FD4-9FD1-6FD665CE9EE3", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", matchCriteriaId: "082BE536-F29C-4A73-B030-A19DD3A448B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_7335u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC0B667F-FD5E-4C1A-847A-1B2F45A2D69D", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", matchCriteriaId: "495E436C-B0EE-4B72-AB49-332F4752C140", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E257B95-9956-41FD-80C6-99B7EE381563", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*", matchCriteriaId: "29805A0A-1E52-4545-9D41-B9A1EE571778", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_pro_7940hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B358D4EA-77A1-48B0-BA2A-0A20FBA32B42", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*", matchCriteriaId: "018A02C9-2A5C-43E2-8CCD-4D03C119C22B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_pro_7940h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DE7AEE4B-9C20-4BFA-935A-912AD84C2501", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2BF0B4-1F37-49FB-A700-9E31736FE3B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08D8E4C6-D740-43AD-B0CA-13CA9374CFEA", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8480A7E0-882C-4B03-ADBC-697304B0B7C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7840h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB760DFF-B67E-4BDE-8E74-98C5B6B75169", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*", matchCriteriaId: "2AC94883-E412-4CC9-B3E5-BC5727336746", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7840u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "556B951D-B072-4777-B8A4-BA70480C7008", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840u:-:*:*:*:*:*:*:*", matchCriteriaId: "8E0E7D4C-2E62-4EAE-8CC6-574A72746489", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BB659EC-BBEA-47A1-BD32-4AD0CD428BC4", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0E3657C6-1047-4CA9-8D44-C7143F7D877D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7640h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C43E795E-C271-456B-B323-112664540D52", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640h:-:*:*:*:*:*:*:*", matchCriteriaId: "0E8C8A86-BF92-4BF1-B00E-3B4031FEA460", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7640u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A3C89313-362C-4173-B1E7-3724F8C84668", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640u:-:*:*:*:*:*:*:*", matchCriteriaId: "7F482819-EAEC-47E8-93AF-E38FE7F5B1F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7545u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA9B39AB-2CC9-44AB-9DDB-6C1E632AE3BC", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7545u:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9FED55-880B-47E1-B627-5A2645A47F5F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7540u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AB3F89D3-01FF-4EC9-B34F-6EFFD04B8759", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7540u:-:*:*:*:*:*:*:*", matchCriteriaId: "D82E1AF6-F906-4008-8DF5-F5BD0DF200DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_7440u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4EE38EEB-8DE2-4926-AB2B-E39B7AE923C9", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_7440u:-:*:*:*:*:*:*:*", matchCriteriaId: "E2732E07-F0EA-46FB-AFF6-58B8C581D3C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E2475CD-C586-4280-B631-06313BA4E47E", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*", matchCriteriaId: "C822A153-C32B-423B-8660-EAE0A1DEB4EB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF9574E4-30B3-451B-A9A4-E429CC86ED84", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*", matchCriteriaId: "86704116-43D0-47FD-8896-AB00C265AAE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E257B95-9956-41FD-80C6-99B7EE381563", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*", matchCriteriaId: "29805A0A-1E52-4545-9D41-B9A1EE571778", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation.\n\n\n\n\n\n\n\n\n", }, { lang: "es", value: "Una condición de ejecución en el código de System Management Mode (SMM) puede permitir que un atacante que utilice un espacio de usuario comprometido aproveche CVE-2018-8897, lo que podría generar una escalada de privilegios.", }, ], id: "CVE-2023-20571", lastModified: "2024-11-21T07:41:09.000", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:15.977", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-362", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:41
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2BB2976-40B7-453F-8569-A55498163B8A", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5100:-:*:*:*:*:*:*:*", matchCriteriaId: "8576A19F-AC8F-457B-8EA5-651B552ED0F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6D53AACA-360B-477C-A3A8-30575F8A4434", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", matchCriteriaId: "D34308FA-D6D1-4024-95F5-45C86EFBF00A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0A553B39-2550-4E53-847E-E2EF70F0EED5", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", matchCriteriaId: "94E19774-C744-46AC-B8F8-2B3E2BB19050", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A7BCE6E4-B1F5-421B-932F-20E035F5655D", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0711A972-5E88-448E-9586-98F8017F08B0", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", matchCriteriaId: "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33D2C3BA-7A30-49D8-8BAD-4C2010260B7D", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", matchCriteriaId: "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9691D81C-ADE3-4FE3-9EC7-9D994FDBA08F", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E3CA3FBA-9DA5-4515-8911-DD8BD4C74A2A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6EEF80D5-DFA2-4751-A1F7-E769D7D4B46D", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", matchCriteriaId: "A6746407-9EC7-49B2-93B4-926174F2A457", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AF726744-1ED4-41A1-A118-F770060B3EB3", versionEndExcluding: "comboam4v2_1.2.0.b", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", matchCriteriaId: "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7500f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B8BF62DE-E6C3-44D6-A6CA-A7569C0028C9", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", matchCriteriaId: "1232B034-1214-4F9A-823D-DC76D5C5956B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7600_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "34C1601D-0D8F-4999-96E5-9F18C103E7D6", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "6740A06F-4512-427D-9CB9-A4A6DB046BA3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7600x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "79FE13D8-9892-40FF-9578-012A902BB809", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6C05D51F-469D-487D-9FC8-E1AD699A6F74", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7700_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F808006D-E334-4056-BB6E-721CE8E6C3A5", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", matchCriteriaId: "76121981-8DC2-4779-833E-4B15CFCF7FC3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7700x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "16C0B50B-2174-4A65-A02C-C61DF824642B", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", matchCriteriaId: "225E8405-04FF-4885-92C8-8581ACC66E06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2709A848-FD96-415C-88A9-33B1D3D6A0D8", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6CD984-A8C7-4B23-8FF9-896C503EBA37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "68946875-089B-46C2-8559-57279CED7AA4", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", matchCriteriaId: "5602B902-9FDB-4946-BE4C-236262285F2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A92815DD-968F-4F2F-A95C-5F1DA5E64B8E", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", matchCriteriaId: "AA666DF3-C5F3-4127-A8EE-B784DD41F642", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C113EB7A-3035-4473-86F8-D40B374F4AD9", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "86CAA682-9666-4929-B1AC-D9DB3109DB1A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7950x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA564A7C-17C7-4B87-BBB8-C6A582494B16", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", matchCriteriaId: "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "60CEFA0A-6831-4D50-B32B-641EA678E9D4", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "F05C8669-6348-4A1B-B1D4-D22022E1F67E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_3900_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39753DB1-4B49-4DF2-A68B-A8C5FE1BB48F", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_3900:-:*:*:*:*:*:*:*", matchCriteriaId: "CB7B70E0-0F62-4472-B89C-5EAC66531A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_7645_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39651B76-7427-4C40-B983-40815CE247C1", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_7645:-:*:*:*:*:*:*:*", matchCriteriaId: "1A46CA03-E0F1-4CAA-9E8E-D7338F8E7020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_7745_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "75043829-195B-420F-95E9-FF0070CED140", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_7745:-:*:*:*:*:*:*:*", matchCriteriaId: "A9BCCAEB-88C6-4D1A-98DE-52DBF5E7C61D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_pro_7945_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F7DC58D6-0A95-4DC9-9D95-A11F488883B3", versionEndExcluding: "comboam5_1.0.7.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_pro_7945:-:*:*:*:*:*:*:*", matchCriteriaId: "4A2DE723-9682-45C2-8765-221074EA4327", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "21A2BF92-9EDF-4597-B8C6-D64C15C6E68F", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", matchCriteriaId: "A5F962DD-90D5-47AB-8ABC-36E925821636", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "573DADDC-5D67-4FF1-9859-4D70FE300033", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", matchCriteriaId: "0B1390DB-9E89-4C57-93F7-06B36EFDE579", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B51F66F2-2D9C-44C8-AC65-A1B590CB5106", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", matchCriteriaId: "74236755-56DA-4245-A07F-DF9817D8F01D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5500h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "754E1DF8-5C97-4ABF-B6DC-04F535E9A185", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*", matchCriteriaId: "69C443EB-CF9B-4B50-A0F2-CD652D5E1467", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "39B66D4D-52D0-4FF4-B0C7-97415BB44B40", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", matchCriteriaId: "94BB2CE6-E989-43EE-B501-0DA6079BA420", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7605A06C-780A-4715-A457-542670759B10", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", matchCriteriaId: "9A5FDA44-978A-4ACC-9A42-00929DFE485B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D015E817-C084-485E-A8ED-7009D43CC5E4", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FD963142-F19B-42C9-AB46-8F24CD773BE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F072C98A-51AE-4B44-BA2F-4E019F0E7325", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", matchCriteriaId: "85D64E8F-BB90-4425-9980-9D2E2B74E83B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "78076025-1D1E-4B99-95FF-245DED79737E", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", matchCriteriaId: "C16BC515-84AE-432F-853B-822E737C242F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0674D7D8-5BF6-4C72-BDAC-068191A6A429", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", matchCriteriaId: "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "29665F3F-3892-4ADD-BE0A-D42BAD8546D1", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B5A4DE59-BD5A-439E-B4FD-C96EC1F89A42", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CD374898-A6F3-4E66-A2A5-1D9ED91A4721", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", matchCriteriaId: "BF398C51-EB53-4C3F-8D88-BD3931D9293F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "101053D3-3123-494A-8365-83F89777B57B", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "FE64730D-B284-450E-9450-72AAEBAE2000", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0C9F10CF-A540-4457-A85F-375350CA4602", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BDB04-877C-472D-A3BB-6C32FF269E00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7D6AA2DD-CF5F-4503-8823-7F13F11133D7", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "6C00179A-620B-4DC7-893A-11AFAB9EE13C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4A0A2D5-C857-47A2-A061-17078E90DF06", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "8308D5A2-0985-487C-B16C-4EEF835BDD4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A12F787C-7BFD-4032-AA79-0ECC2C7520F6", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "3674D656-9623-4B39-AADE-158FE70FF29F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4052FC6B-C745-45F7-B4D3-52D477970C7E", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "B21FB338-F944-40F9-8F0C-99B471AAD51E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2D5930F-9DF4-4757-99DE-CFF7425400A1", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "926B633F-103A-4790-A480-572B023EFA03", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6DF6D614-3BE2-430B-A178-CDE9E06FFF83", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", matchCriteriaId: "09B085FF-EAEA-42BC-BA60-3AA9B76141B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1DFD9A4C-2EFD-4BF3-A47E-2B12B64A7B47", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "760F20CC-9034-462C-A25E-C009E2218C38", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_6800u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E16F2ADD-A6B9-4DF1-A1E9-BCC2D22E2102", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", matchCriteriaId: "1D2CBCEA-AB4F-444C-9CCD-A976003F796C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90B1DD03-461C-4F57-B050-3789FE94B8E9", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", matchCriteriaId: "7D260012-5D8F-4B36-8B88-82DB0291EE9D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8420AEF0-48E3-45B8-B873-B309123BBE4B", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_6600u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E3F86344-B46A-47C4-AE4F-68D4484060E0", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", matchCriteriaId: "025E494E-953E-426E-BE89-6F2360A3AAC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BE2658AC-7355-426D-966F-824E84394BDF", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", matchCriteriaId: "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7736u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F92E9B0-5589-4974-B043-846F14A61E69", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", matchCriteriaId: "5D50E8EA-ECB2-463D-BA51-D13CF5A02266", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_7735u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DCAE3FBB-E72E-4CD8-808C-73CFA2309388", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", matchCriteriaId: "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1CAE47BF-747E-4B34-88C5-F7F3DA34661E", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", matchCriteriaId: "EE36D471-57BF-4385-A825-029F7313E4DB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_7535u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F3DA6321-EBBC-4FD4-9FD1-6FD665CE9EE3", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", matchCriteriaId: "082BE536-F29C-4A73-B030-A19DD3A448B3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_7335u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC0B667F-FD5E-4C1A-847A-1B2F45A2D69D", versionEndExcluding: "rembrandtpi-fp7_1.0.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", matchCriteriaId: "495E436C-B0EE-4B72-AB49-332F4752C140", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E257B95-9956-41FD-80C6-99B7EE381563", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*", matchCriteriaId: "29805A0A-1E52-4545-9D41-B9A1EE571778", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_pro_7940hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B358D4EA-77A1-48B0-BA2A-0A20FBA32B42", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*", matchCriteriaId: "018A02C9-2A5C-43E2-8CCD-4D03C119C22B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_9_pro_7940h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DE7AEE4B-9C20-4BFA-935A-912AD84C2501", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2BF0B4-1F37-49FB-A700-9E31736FE3B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "08D8E4C6-D740-43AD-B0CA-13CA9374CFEA", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8480A7E0-882C-4B03-ADBC-697304B0B7C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7840h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB760DFF-B67E-4BDE-8E74-98C5B6B75169", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*", matchCriteriaId: "2AC94883-E412-4CC9-B3E5-BC5727336746", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7840u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "556B951D-B072-4777-B8A4-BA70480C7008", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840u:-:*:*:*:*:*:*:*", matchCriteriaId: "8E0E7D4C-2E62-4EAE-8CC6-574A72746489", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BB659EC-BBEA-47A1-BD32-4AD0CD428BC4", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0E3657C6-1047-4CA9-8D44-C7143F7D877D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7640h_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C43E795E-C271-456B-B323-112664540D52", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640h:-:*:*:*:*:*:*:*", matchCriteriaId: "0E8C8A86-BF92-4BF1-B00E-3B4031FEA460", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7640u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A3C89313-362C-4173-B1E7-3724F8C84668", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640u:-:*:*:*:*:*:*:*", matchCriteriaId: "7F482819-EAEC-47E8-93AF-E38FE7F5B1F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7545u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA9B39AB-2CC9-44AB-9DDB-6C1E632AE3BC", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7545u:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9FED55-880B-47E1-B627-5A2645A47F5F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7540u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AB3F89D3-01FF-4EC9-B34F-6EFFD04B8759", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7540u:-:*:*:*:*:*:*:*", matchCriteriaId: "D82E1AF6-F906-4008-8DF5-F5BD0DF200DE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_7440u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4EE38EEB-8DE2-4926-AB2B-E39B7AE923C9", versionEndExcluding: "phoenixpi-fp8-fp7_pi_1.0.0.1g", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_7440u:-:*:*:*:*:*:*:*", matchCriteriaId: "E2732E07-F0EA-46FB-AFF6-58B8C581D3C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_5_pro_7530u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E2475CD-C586-4280-B631-06313BA4E47E", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7530u:-:*:*:*:*:*:*:*", matchCriteriaId: "C822A153-C32B-423B-8660-EAE0A1DEB4EB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_3_pro_7330u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF9574E4-30B3-451B-A9A4-E429CC86ED84", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_pro_7330u:-:*:*:*:*:*:*:*", matchCriteriaId: "86704116-43D0-47FD-8896-AB00C265AAE0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:ryzen_7_pro_7730u_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E257B95-9956-41FD-80C6-99B7EE381563", versionEndExcluding: "cezannepi-fp6_1.0.0.f", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7730u:-:*:*:*:*:*:*:*", matchCriteriaId: "29805A0A-1E52-4545-9D41-B9A1EE571778", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.\n\n\n\n\n\n\n\n\n", }, { lang: "es", value: "Las protecciones insuficientes en el código del System Management Mode (SMM) pueden permitir que un atacante habilite potencialmente la escalada de privilegios a través del acceso local.", }, ], id: "CVE-2023-20563", lastModified: "2024-11-21T07:41:07.540", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-11-14T19:15:15.733", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-269", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2023-20571
Vulnerability from cvelistv5
Published
2023-11-14 18:55
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” |
Version: various |
||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:45.850Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ 7000 Series Desktop Processors “Raphael” XD3", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics \"Rembrandt\"", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics “Barcelo”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: " Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics “Phoenix” FP7/FP7r2/FP8", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation.\n\n\n\n\n\n\n\n<br>", }, ], value: "A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation.\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2023-11-14T18:55:02.307Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, ], source: { advisory: "AMD-SB-4002", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20571", datePublished: "2023-11-14T18:55:02.307Z", dateReserved: "2022-10-27T18:53:39.755Z", dateUpdated: "2024-08-02T09:05:45.850Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20563
Vulnerability from cvelistv5
Published
2023-11-14 18:54
Modified
2024-10-22 13:44
Severity ?
EPSS score ?
Summary
Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:45.851Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], title: "CVE Program Container", }, { affected: [ { cpes: [ "cpe:2.3:h:amd:ryzen_5000_series_desktop_processors_with_radeon_graphics:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_5000_series_desktop_processors_with_radeon_graphics", vendor: "amd", versions: [ { status: "affected", version: "ComboAM4V2 1.2.0.B *(2023-08-25)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_7000_series_desktop_processors:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_7000_series_desktop_processors", vendor: "amd", versions: [ { status: "affected", version: "ComboAM5 1.0.7.0 (2023-04-18)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_5000_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_5000_series_mobile_processors_with_radeon_graphics", vendor: "amd", versions: [ { status: "affected", version: "CezannePI-FP6 1.0.0.F (2023-06-20)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_6000_series_processors_with_radeon_graphics:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_6000_series_processors_with_radeon_graphics", vendor: "amd", versions: [ { status: "affected", version: "RembrandtPI-FP7 1.0.0.9 (2023-05-16)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_7035_series_processors_with_radeon_graphics:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_7035_series_processors_with_radeon_graphics", vendor: "amd", versions: [ { status: "affected", version: "RembrandtPI-FP7 1.0.0.9 (2023-05-16)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_5000_series_processors_with_radeon_graphics:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_5000_series_processors_with_radeon_graphics", vendor: "amd", versions: [ { status: "affected", version: "CezannePI-FP6 1.0.0.F (2023-06-20)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_7030_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_7030_series_mobile_processors_with_radeon_graphics", vendor: "amd", versions: [ { status: "affected", version: "CezannePI-FP6 1.0.0.F (2023-06-20)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_7040_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_7040_series_mobile_processors_with_radeon_graphics", vendor: "amd", versions: [ { status: "affected", version: "PhoenixPI-FP8-FP7 PI 1.0.0.1g (2023-05-11)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_embedded_r1000", vendor: "amd", versions: [ { status: "affected", version: "EmbeddedPI-FP5 1.2.0.A (2023-07-31)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_embedded_r2000", vendor: "amd", versions: [ { status: "affected", version: "EmbeddedPI-FP5 1.0.0.2 (2023-07-31)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_embedded_5000:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_embedded_5000", vendor: "amd", versions: [ { status: "affected", version: "EmbAM4PI 1.0.0.3 (2023-07-31)", }, ], }, { cpes: [ "cpe:2.3:h:amd:ryzen_embedded_v3000:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ryzen_embedded_v3000", vendor: "amd", versions: [ { status: "affected", version: "EmbeddedPI-FP7r2 1.0.0.6 (2023-09-15)", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2023-20563", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-10-15T17:15:29.685693Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { description: "CWE-noinfo Not enough information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-22T13:44:05.548Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ 7000 Series Desktop Processors “Raphael” XD3", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics \"Rembrandt\"", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics “Barcelo”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics “Phoenix” FP7/FP7r2/FP8", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded R1000", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded R2000", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded 5000", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded V3000", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.\n\n\n\n\n\n\n\n<br>", }, ], value: "Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2024-02-13T19:27:18.318Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], source: { advisory: "AMD-SB-4002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20563", datePublished: "2023-11-14T18:54:41.308Z", dateReserved: "2022-10-27T18:53:39.747Z", dateUpdated: "2024-10-22T13:44:05.548Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20565
Vulnerability from cvelistv5
Published
2023-11-14 18:54
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | vendor-advisory | |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” |
Version: various |
||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:45.856Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { tags: [ "vendor-advisory", "x_transferred", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "Ryzen™ 7000 Series Desktop Processors “Raphael” XD3", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics \"Rembrandt\"", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics “Barcelo”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: "AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", packageName: "PI", platforms: [ "x86", ], product: " Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics “Phoenix” FP7/FP7r2/FP8", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, { defaultStatus: "unaffected", product: "AMD Ryzen™ Embedded V3000", vendor: "AMD", versions: [ { status: "affected", version: "various ", }, ], }, ], datePublic: "2023-11-14T17:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.\n\n\n\n\n\n\n\n<br>", }, ], value: "Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.\n\n\n\n\n\n\n\n\n", }, ], providerMetadata: { dateUpdated: "2024-02-13T19:27:26.573Z", orgId: "b58fc414-a1e4-4f92-9d70-1add41838648", shortName: "AMD", }, references: [ { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002", }, { tags: [ "vendor-advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], source: { advisory: "AMD-SB-4002, AMD-SB-5001", discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648", assignerShortName: "AMD", cveId: "CVE-2023-20565", datePublished: "2023-11-14T18:54:51.738Z", dateReserved: "2022-10-27T18:53:39.752Z", dateUpdated: "2024-08-02T09:05:45.856Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }