BDU:2025-03388
Vulnerability from fstec - Published: 14.11.2023
VLAI Severity ?
Title
Уязвимость процессоров AMD, связанная c неправильным контролем доступа, позволяющая нарушителю выполнить произвольный код
Description
Уязвимость процессоров AMD связана c неправильный контролем доступа в режиме управления системой (SMM). Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольный код
Severity ?
Vendor
ООО «Ред Софт», Advanced Micro Devices Inc., Сообщество свободного программного обеспечения
Software Name
РЕД ОС (запись в едином реестре российских программ №3751), AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Pollock, AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso, AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali FP5, AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali, AMD Ryzen 3000 Series Desktop Processors Matisse AM4, AMD Ryzen 5000 Series Desktop Processors Vermeer AM4, AMD Ryzen 3000 Series Mobile Processors with Radeon Graphics Picasso, AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Cezanne, AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Lucienne, AMD Ryzen Embedded V1000, Linux-firmware, AMD Ryzen 5000 Series Desktop Processor with Radeon Graphics Cezanne, AMD Ryzen Threadripper 2000 Series Processors Colfax, AMD Ryzen Threadripper 3000 Series Processors “Castle Peak” HEDT, AMD Ryzen Threadripper PRO Processors “Castle Peak” WS SP3, AMD Ryzen Threadripper PRO 3000WX Series Processors “Chagall” WS, AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics Renoir FP6, AMD Ryzen 6000 Series Processors with Radeon Graphics Rembrandt, AMD Ryzen 7035 Series Processors with Radeon Graphics “Rembrandt-R”, AMD Ryzen 7030 Series Mobile Processors with Radeon Graphics “Barcelo-R”, AMD Ryzen Embedded R2000, AMD Ryzen Embedded 5000, AMD Ryzen Embedded R1000, AMD Ryzen Embedded V2000, AMD Ryzen Embedded V3000
Software Version
7.3 (РЕД ОС), до PollockPI-FT5 1.0.0.5 (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Pollock), до ComboAM4PI 1.0.0.9 (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso), до ComboAM4v2 PI 1.2.0.8 (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso), до PicassoPI-FP5 1.0.0.E (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali FP5), до PicassoPI-FP5 1.0.0.E (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali), до ComboAM4PI 1.0.0.9 (AMD Ryzen 3000 Series Desktop Processors Matisse AM4), до ComboAM4v2 PI 1.2.0.8 (AMD Ryzen 3000 Series Desktop Processors Matisse AM4), до ComboAM4 V2 PI 1.2.0.8 (AMD Ryzen 5000 Series Desktop Processors Vermeer AM4), до PicassoPI-FP5 1.0.0.E (AMD Ryzen 3000 Series Mobile Processors with Radeon Graphics Picasso), до CezannePI-FP6 1.0.0.B (AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Cezanne), до CezannePI-FP6 1.0.0.B (AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Lucienne), до EmbeddedPI-FP5 1.2.0.A (AMD Ryzen Embedded V1000), до 20230404 (Linux-firmware), до ComboAM4v2 PI 1.2.0.8 (AMD Ryzen 5000 Series Desktop Processor with Radeon Graphics Cezanne), до SummitPI-SP3r2 1.1.0.6 (AMD Ryzen Threadripper 2000 Series Processors Colfax), до CastlePeakPI-SP3r3 1.0.0.8 (AMD Ryzen Threadripper 3000 Series Processors “Castle Peak” HEDT), до CastlePeakWSPI-sWRX8 1.0.0.A (AMD Ryzen Threadripper PRO Processors “Castle Peak” WS SP3), до ChagallWSPI 1.0.0.3 (AMD Ryzen Threadripper PRO Processors “Castle Peak” WS SP3), до ChagallWSPI 1.0.0.3 (AMD Ryzen Threadripper PRO 3000WX Series Processors “Chagall” WS), до RenoirPI-FP6 1.0.0.9 (AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics Renoir FP6), до ComboAM4v2 PI 1.2.0.8 (AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics Renoir FP6), до RembrandtPI-FP7 1.0.0.2 (AMD Ryzen 6000 Series Processors with Radeon Graphics Rembrandt), до RembrandtPI-FP7 1.0.0.2 (AMD Ryzen 7035 Series Processors with Radeon Graphics “Rembrandt-R”), до CezannePI-FP6 1.0.0.B (AMD Ryzen 7030 Series Mobile Processors with Radeon Graphics “Barcelo-R”), до EmbeddedPI-FP5 1.0.0.2 (AMD Ryzen Embedded R2000), до EmbAM4PI 1.0.0.2 (AMD Ryzen Embedded 5000), до EmbeddedPI-FP5 1.2.0.A (AMD Ryzen Embedded R1000), до EmbeddedPI-FP6 1.0.0.8 (AMD Ryzen Embedded V2000), до EmbeddedPI-FP7r2 1.0.0.0 (AMD Ryzen Embedded V3000)
Possible Mitigations
Использование рекомендаций:
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html
Для РедОС:
https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2022-23821/?sphrase_id=756843
Reference
https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2022-23821/?sphrase_id=756843
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html
CWE
CWE-284
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Advanced Micro Devices Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.3 (\u0420\u0415\u0414 \u041e\u0421), \u0434\u043e PollockPI-FT5 1.0.0.5 (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Pollock), \u0434\u043e ComboAM4PI 1.0.0.9 (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso), \u0434\u043e ComboAM4v2 PI 1.2.0.8 (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso), \u0434\u043e \tPicassoPI-FP5 1.0.0.E (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali FP5), \u0434\u043e \tPicassoPI-FP5 1.0.0.E (AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali), \u0434\u043e ComboAM4PI 1.0.0.9 (AMD Ryzen 3000 Series Desktop Processors Matisse AM4), \u0434\u043e ComboAM4v2 PI 1.2.0.8 (AMD Ryzen 3000 Series Desktop Processors Matisse AM4), \u0434\u043e ComboAM4 V2 PI 1.2.0.8 (AMD Ryzen 5000 Series Desktop Processors Vermeer AM4), \u0434\u043e PicassoPI-FP5 1.0.0.E (AMD Ryzen 3000 Series Mobile Processors with Radeon Graphics Picasso), \u0434\u043e CezannePI-FP6 1.0.0.B (AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Cezanne), \u0434\u043e CezannePI-FP6 1.0.0.B (AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Lucienne), \u0434\u043e EmbeddedPI-FP5 1.2.0.A (AMD Ryzen Embedded V1000), \u0434\u043e 20230404 (Linux-firmware), \u0434\u043e ComboAM4v2 PI 1.2.0.8 (AMD Ryzen 5000 Series Desktop Processor with Radeon Graphics Cezanne), \u0434\u043e SummitPI-SP3r2 1.1.0.6 (AMD Ryzen Threadripper 2000 Series Processors Colfax), \u0434\u043e CastlePeakPI-SP3r3 1.0.0.8 (AMD Ryzen Threadripper 3000 Series Processors \u201cCastle Peak\u201d HEDT), \u0434\u043e CastlePeakWSPI-sWRX8 1.0.0.A (AMD Ryzen Threadripper PRO Processors \u201cCastle Peak\u201d WS SP3), \u0434\u043e ChagallWSPI 1.0.0.3 (AMD Ryzen Threadripper PRO Processors \u201cCastle Peak\u201d WS SP3), \u0434\u043e ChagallWSPI 1.0.0.3 (AMD Ryzen Threadripper PRO 3000WX Series Processors \u201cChagall\u201d WS), \u0434\u043e RenoirPI-FP6 1.0.0.9 (AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics Renoir FP6), \u0434\u043e ComboAM4v2 PI 1.2.0.8 (AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics Renoir FP6), \u0434\u043e RembrandtPI-FP7 1.0.0.2 (AMD Ryzen 6000 Series Processors with Radeon Graphics Rembrandt), \u0434\u043e RembrandtPI-FP7 1.0.0.2 (AMD Ryzen 7035 Series Processors with Radeon Graphics \u201cRembrandt-R\u201d), \u0434\u043e CezannePI-FP6 1.0.0.B (AMD Ryzen 7030 Series Mobile Processors with Radeon Graphics \u201cBarcelo-R\u201d), \u0434\u043e EmbeddedPI-FP5 1.0.0.2 (AMD Ryzen Embedded R2000), \u0434\u043e EmbAM4PI 1.0.0.2 (AMD Ryzen Embedded 5000), \u0434\u043e EmbeddedPI-FP5 1.2.0.A (AMD Ryzen Embedded R1000), \u0434\u043e EmbeddedPI-FP6 1.0.0.8 (AMD Ryzen Embedded V2000), \u0434\u043e EmbeddedPI-FP7r2 1.0.0.0 (AMD Ryzen Embedded V3000)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002\nhttps://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: \nhttps://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2022-23821/?sphrase_id=756843",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "14.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "27.03.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "27.03.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-03388",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-23821",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Pollock, AMD Athlon 3000 Series Desktop Processors with Radeon Graphics Picasso, AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali FP5, AMD Athlon 3000 Series Mobile Processors with Radeon Graphics Dali, AMD Ryzen 3000 Series Desktop Processors Matisse AM4, AMD Ryzen 5000 Series Desktop Processors Vermeer AM4, AMD Ryzen 3000 Series Mobile Processors with Radeon Graphics Picasso, AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Cezanne, AMD Ryzen 5000 Series Mobile Processors with Radeon Graphics Lucienne, AMD Ryzen Embedded V1000, Linux-firmware, AMD Ryzen 5000 Series Desktop Processor with Radeon Graphics Cezanne, AMD Ryzen Threadripper 2000 Series Processors Colfax, AMD Ryzen Threadripper 3000 Series Processors \u201cCastle Peak\u201d HEDT, AMD Ryzen Threadripper PRO Processors \u201cCastle Peak\u201d WS SP3, AMD Ryzen Threadripper PRO 3000WX Series Processors \u201cChagall\u201d WS, AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics Renoir FP6, AMD Ryzen 6000 Series Processors with Radeon Graphics Rembrandt, AMD Ryzen 7035 Series Processors with Radeon Graphics \u201cRembrandt-R\u201d, AMD Ryzen 7030 Series Mobile Processors with Radeon Graphics \u201cBarcelo-R\u201d, AMD Ryzen Embedded R2000, AMD Ryzen Embedded 5000, AMD Ryzen Embedded R1000, AMD Ryzen Embedded V2000, AMD Ryzen Embedded V3000",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 AMD, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f c \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u043c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0435\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (CWE-284)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 AMD \u0441\u0432\u044f\u0437\u0430\u043d\u0430 c \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0435\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 (SMM). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-linux-firmware-cve-2022-23821/?sphrase_id=756843\nhttps://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002\nhttps://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-284",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…