Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-26351 (GCVE-0-2021-26351)
Vulnerability from cvelistv5 – Published: 2022-05-12 17:18 – Updated: 2024-09-16 22:41
VLAI?
EPSS
Summary
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service.
Severity ?
No CVSS data available.
CWE
- tbd
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://www.amd.com/en/corporate/product-security… | x_refsource_MISC |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| AMD | Ryzen™ Series |
Affected:
various
|
|
| AMD | Athlon™ Series |
Affected:
various
|
Date Public ?
2022-05-10 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:26:24.483Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Ryzen\u2122 Series",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"product": "Athlon\u2122 Series",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
}
],
"datePublic": "2022-05-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "tbd",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-12T17:18:51.000Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"source": {
"advisory": "AMD-SB-1027",
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
"ID": "CVE-2021-26351",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Ryzen\u2122 Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
},
{
"product_name": "Athlon\u2122 Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
}
]
},
"vendor_name": "AMD"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "tbd"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
"refsource": "MISC",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
]
},
"source": {
"advisory": "AMD-SB-1027",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2021-26351",
"datePublished": "2022-05-12T17:18:51.729Z",
"dateReserved": "2021-01-29T00:00:00.000Z",
"dateUpdated": "2024-09-16T22:41:24.903Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-26351",
"date": "2026-05-12",
"epss": "0.00126",
"percentile": "0.31317"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32B01772-B9AB-4724-BC36-C707E01C9EDB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE4F55EF-4F2B-499C-8173-12BE32085744\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBA86063-6EE8-446E-BCE1-210B0699103B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22B7FA81-11D0-4DC2-B81D-1BD48D341E6A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45C1A897-5FA2-403D-86C2-9D67C5B043A9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1117C6B9-C87A-4185-A7DE-B4221BB59ABC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5F962DD-90D5-47AB-8ABC-36E925821636\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98831A6B-A51F-48A9-80D7-B903A4F0A936\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B1390DB-9E89-4C57-93F7-06B36EFDE579\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"962E91F5-037B-4532-A5DB-FCC01631666F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D97A583-39ED-4B1C-B7D9-48F0F56294A8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74236755-56DA-4245-A07F-DF9817D8F01D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AC21C1E-D4E7-424F-A284-BBE94194B43C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF3EDC73-2517-4EBF-B160-85266304D866\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8650BE66-7694-4DD9-94E5-73A7DD0A124D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94AB5202-A5A2-479E-B4B0-347C823201AD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15D68B5B-0878-47BA-9DCC-BF2D793F92E7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9B07D45-5EA5-405E-A649-DADE2451E3EC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D72FC510-6F4C-4D04-BEA9-9DDE22617CEF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09342618-057F-4F49-A43F-352212738F80\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94BB2CE6-E989-43EE-B501-0DA6079BA420\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5898533-4CDE-496C-99A8-361F8C8E5A85\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A5FDA44-978A-4ACC-9A42-00929DFE485B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8928F3EB-EE42-4ABB-A76D-619AFEA284B6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD963142-F19B-42C9-AB46-8F24CD773BE0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4DA33B2-B942-447F-9229-A41808411F38\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85D64E8F-BB90-4425-9980-9D2E2B74E83B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91D4E46F-20BB-46BE-A36F-826E2A15E931\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FD86A5C-A9A9-4C84-91D9-54F2516E8487\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7D9532A-0FA1-43E8-A2F7-B2436AF64189\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAED3E10-E29A-41E8-9758-C0DEEB13D630\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3C4424D-70E5-4101-B39C-15EEC4E933BE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C16BC515-84AE-432F-853B-822E737C242F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF14DD9D-3906-4E4F-804E-00B41525285C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F99F7EA-8CDF-45F5-9579-E902C3D02E7F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B1FF616-B7B9-41E1-9F16-86B24C5FA22C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C215E52-0E0C-42F5-9140-8313E847A2FC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"937E2FA2-BED8-48FF-8D01-153D4039F224\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6788A3F-6731-4529-AAFF-3CB893C0D07B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DC56C52-6200-47CD-A722-28A1437050B3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A1449EC-F9D9-4846-A6E1-56F0B1EE8849\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13AB11C7-28F2-41AF-85D4-F391E02797A4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DC33A3B-F40D-4532-AA66-4E23360F94E2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2A09152-93D2-493D-8CE0-8A4F30F0DD39\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"337E685C-4B65-441C-AD06-E8374CC39450\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DBB31D3-58CA-44EE-B115-77D1D83D9E23\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9669B2E-9590-4521-AC69-E7F5F201CAA3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF398C51-EB53-4C3F-8D88-BD3931D9293F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53240910-3F88-465C-A0CD-A98395A05756\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ED8BD87-468E-4953-96B1-CF923985B963\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F23104CA-40BB-497E-809E-B89BDBB8B844\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A468A5E6-BCFA-4141-955E-D7AFE1737913\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB09D697-326C-4902-BB5A-C5EAC9A2BD22\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE64730D-B284-450E-9450-72AAEBAE2000\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DD6028F-DD27-4D81-8E0A-06C2F1B9277C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB9BDB04-877C-472D-A3BB-6C32FF269E00\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"808C582D-4F80-4378-B177-012EEF438443\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C00179A-620B-4DC7-893A-11AFAB9EE13C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1031085D-AD15-4124-803E-9B742E7484A0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27CDB416-B093-4871-8142-1D7EB5BF90B6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52C9FEEF-0D0F-40DC-9E98-248F8608B755\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59A9F95C-E531-40FA-BCE7-3CEB6E26497B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3964CA7C-996C-43C5-B1A5-14046DAD07BD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5454A72B-76EC-46D9-8675-97DC076D7615\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AF7F277-B1E1-4C44-B122-91A7B7D299DE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1B5369B-DFFE-4A84-8894-513AE7FC7C6C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"978DF75D-F7B7-40F6-8054-9551306106F7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7AE0210-F156-42BA-AAD5-177A2E845A4B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72F74102-CBC1-4BB8-80A7-A2DCB6F4239A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D1A55FE-F144-494E-BCF0-7E367DA56E40\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73A86733-31A4-4146-9539-01883B0D315A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85D99997-1389-493E-BDEA-9904A46E48EE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E61614-68FD-437A-8037-801E0663CBD8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3D16B66-A4EC-422D-856A-A862ECE13FBE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54611A05-BCA3-495A-8CDB-946FF47E0333\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E38E22B3-AAAF-4075-9DEB-5198A8283E15\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC97F277-4BFD-41D7-A205-631C6FBE8DAB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B08A5CCF-054C-450B-93FC-8A3A4577CA00\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CC4654E-519B-4412-B551-F2436108152B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A97EE77A-DB13-4A81-8BCD-E3BC1E45F420\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38997E8B-D2B7-4AB2-BB6E-33966511AF38\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B99E921-4023-4E28-BAB7-A830487B3850\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51BD2B6B-A491-4430-ACDA-019C8E1D0348\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service.\"}, {\"lang\": \"es\", \"value\": \"Una comprobaci\\u00f3n insuficiente de la direcci\\u00f3n de la DRAM en System Management Unit (SMU) puede resultar en una lectura/escritura de DMA (Acceso Directo a Memoria) desde/a una direcci\\u00f3n de DRAM no v\\u00e1lida que podr\\u00eda resultar en una denegaci\\u00f3n de servicio\"}]",
"id": "CVE-2021-26351",
"lastModified": "2024-11-21T05:56:11.180",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 4.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-05-12T18:16:53.043",
"references": "[{\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\", \"source\": \"psirt@amd.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-26351\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2022-05-12T18:16:53.043\",\"lastModified\":\"2024-11-21T05:56:11.180\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service.\"},{\"lang\":\"es\",\"value\":\"Una comprobaci\u00f3n insuficiente de la direcci\u00f3n de la DRAM en System Management Unit (SMU) puede resultar en una lectura/escritura de DMA (Acceso Directo a Memoria) desde/a una direcci\u00f3n de DRAM no v\u00e1lida que podr\u00eda resultar en una denegaci\u00f3n de servicio\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B01772-B9AB-4724-BC36-C707E01C9EDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4F55EF-4F2B-499C-8173-12BE32085744\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA86063-6EE8-446E-BCE1-210B0699103B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B7FA81-11D0-4DC2-B81D-1BD48D341E6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C1A897-5FA2-403D-86C2-9D67C5B043A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1117C6B9-C87A-4185-A7DE-B4221BB59ABC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F962DD-90D5-47AB-8ABC-36E925821636\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98831A6B-A51F-48A9-80D7-B903A4F0A936\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1390DB-9E89-4C57-93F7-06B36EFDE579\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962E91F5-037B-4532-A5DB-FCC01631666F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D97A583-39ED-4B1C-B7D9-48F0F56294A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74236755-56DA-4245-A07F-DF9817D8F01D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC21C1E-D4E7-424F-A284-BBE94194B43C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EDC73-2517-4EBF-B160-85266304D866\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8650BE66-7694-4DD9-94E5-73A7DD0A124D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94AB5202-A5A2-479E-B4B0-347C823201AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D68B5B-0878-47BA-9DCC-BF2D793F92E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B07D45-5EA5-405E-A649-DADE2451E3EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72FC510-6F4C-4D04-BEA9-9DDE22617CEF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09342618-057F-4F49-A43F-352212738F80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BB2CE6-E989-43EE-B501-0DA6079BA420\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5898533-4CDE-496C-99A8-361F8C8E5A85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5FDA44-978A-4ACC-9A42-00929DFE485B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8928F3EB-EE42-4ABB-A76D-619AFEA284B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD963142-F19B-42C9-AB46-8F24CD773BE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4DA33B2-B942-447F-9229-A41808411F38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D64E8F-BB90-4425-9980-9D2E2B74E83B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D4E46F-20BB-46BE-A36F-826E2A15E931\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FD86A5C-A9A9-4C84-91D9-54F2516E8487\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D9532A-0FA1-43E8-A2F7-B2436AF64189\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAED3E10-E29A-41E8-9758-C0DEEB13D630\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3C4424D-70E5-4101-B39C-15EEC4E933BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16BC515-84AE-432F-853B-822E737C242F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF14DD9D-3906-4E4F-804E-00B41525285C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F99F7EA-8CDF-45F5-9579-E902C3D02E7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1FF616-B7B9-41E1-9F16-86B24C5FA22C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C215E52-0E0C-42F5-9140-8313E847A2FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"937E2FA2-BED8-48FF-8D01-153D4039F224\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6788A3F-6731-4529-AAFF-3CB893C0D07B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC56C52-6200-47CD-A722-28A1437050B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1449EC-F9D9-4846-A6E1-56F0B1EE8849\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13AB11C7-28F2-41AF-85D4-F391E02797A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC33A3B-F40D-4532-AA66-4E23360F94E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A09152-93D2-493D-8CE0-8A4F30F0DD39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"337E685C-4B65-441C-AD06-E8374CC39450\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBB31D3-58CA-44EE-B115-77D1D83D9E23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9669B2E-9590-4521-AC69-E7F5F201CAA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF398C51-EB53-4C3F-8D88-BD3931D9293F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53240910-3F88-465C-A0CD-A98395A05756\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED8BD87-468E-4953-96B1-CF923985B963\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F23104CA-40BB-497E-809E-B89BDBB8B844\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A468A5E6-BCFA-4141-955E-D7AFE1737913\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB09D697-326C-4902-BB5A-C5EAC9A2BD22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE64730D-B284-450E-9450-72AAEBAE2000\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD6028F-DD27-4D81-8E0A-06C2F1B9277C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9BDB04-877C-472D-A3BB-6C32FF269E00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808C582D-4F80-4378-B177-012EEF438443\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C00179A-620B-4DC7-893A-11AFAB9EE13C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1031085D-AD15-4124-803E-9B742E7484A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27CDB416-B093-4871-8142-1D7EB5BF90B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C9FEEF-0D0F-40DC-9E98-248F8608B755\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A9F95C-E531-40FA-BCE7-3CEB6E26497B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3964CA7C-996C-43C5-B1A5-14046DAD07BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5454A72B-76EC-46D9-8675-97DC076D7615\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF7F277-B1E1-4C44-B122-91A7B7D299DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B5369B-DFFE-4A84-8894-513AE7FC7C6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"978DF75D-F7B7-40F6-8054-9551306106F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7AE0210-F156-42BA-AAD5-177A2E845A4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F74102-CBC1-4BB8-80A7-A2DCB6F4239A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1A55FE-F144-494E-BCF0-7E367DA56E40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73A86733-31A4-4146-9539-01883B0D315A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D99997-1389-493E-BDEA-9904A46E48EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E61614-68FD-437A-8037-801E0663CBD8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D16B66-A4EC-422D-856A-A862ECE13FBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54611A05-BCA3-495A-8CDB-946FF47E0333\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E38E22B3-AAAF-4075-9DEB-5198A8283E15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC97F277-4BFD-41D7-A205-631C6FBE8DAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08A5CCF-054C-450B-93FC-8A3A4577CA00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC4654E-519B-4412-B551-F2436108152B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A97EE77A-DB13-4A81-8BCD-E3BC1E45F420\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38997E8B-D2B7-4AB2-BB6E-33966511AF38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B99E921-4023-4E28-BAB7-A830487B3850\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BD2B6B-A491-4430-ACDA-019C8E1D0348\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
FKIE_CVE-2021-26351
Vulnerability from fkie_nvd - Published: 2022-05-12 18:16 - Updated: 2024-11-21 05:56
Severity ?
Summary
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service."
},
{
"lang": "es",
"value": "Una comprobaci\u00f3n insuficiente de la direcci\u00f3n de la DRAM en System Management Unit (SMU) puede resultar en una lectura/escritura de DMA (Acceso Directo a Memoria) desde/a una direcci\u00f3n de DRAM no v\u00e1lida que podr\u00eda resultar en una denegaci\u00f3n de servicio"
}
],
"id": "CVE-2021-26351",
"lastModified": "2024-11-21T05:56:11.180",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-05-12T18:16:53.043",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-5PJ8-H4RH-GP3H
Vulnerability from github – Published: 2022-05-13 00:00 – Updated: 2022-06-02 00:00
VLAI?
Details
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service.
Severity ?
5.5 (Medium)
{
"affected": [],
"aliases": [
"CVE-2021-26351"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-05-12T18:16:00Z",
"severity": "MODERATE"
},
"details": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service.",
"id": "GHSA-5pj8-h4rh-gp3h",
"modified": "2022-06-02T00:00:24Z",
"published": "2022-05-13T00:00:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26351"
},
{
"type": "WEB",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2021-26351
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2021-26351",
"description": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service.",
"id": "GSD-2021-26351"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-26351"
],
"details": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service.",
"id": "GSD-2021-26351",
"modified": "2023-12-13T01:23:33.327643Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
"ID": "CVE-2021-26351",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Ryzen\u2122 Series ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
},
{
"product_name": " Athlon\u2122 Series ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
}
]
},
"vendor_name": "AMD"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "tbd"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
"refsource": "MISC",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
]
},
"source": {
"advisory": "AMD-SB-1027 ",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"ID": "CVE-2021-26351"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA (Direct Memory Access) read/write from/to invalid DRAM address that could result in denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-06-01T17:54Z",
"publishedDate": "2022-05-12T18:16Z"
}
}
}
WID-SEC-W-2022-0073
Vulnerability from csaf_certbund - Published: 2022-05-10 22:00 - Updated: 2025-02-16 23:00Summary
AMD Prozessoren: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff: Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren.
Betroffene Betriebssysteme: - BIOS/Firmware
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
References
28 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Prozessoren sind die zentralen Rechenwerke eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0073 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0073.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0073 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0073"
},
{
"category": "external",
"summary": "AMD Security Advisory vom 2022-05-10",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
},
{
"category": "external",
"summary": "AMD Security Advisory vom 2022-05-10",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
},
{
"category": "external",
"summary": "Lenovo Security Advisory vom 2022-05-10",
"url": "https://support.lenovo.com/us/en/product_security/LEN-87863"
},
{
"category": "external",
"summary": "HP Security Bulletin HPSBHF03792 vom 2022-05-12",
"url": "https://support.hp.com/us-en/document/ish_6189684-6189764-16/HPSBHF03792"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF04235 vom 2022-05-17",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04235en_us\u0026hprpt_id=ALERT_HPE_3023598\u0026jumpid=em_pom8nu6hj_aid-520066529"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-070 vom 2022-05-20",
"url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-070.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1751-1 vom 2022-05-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1847-1 vom 2022-05-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1840-1 vom 2022-05-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011156.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1846-1 vom 2022-05-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011160.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1923-1 vom 2022-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011226.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2022-1800 vom 2022-06-07",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1800.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-1606 vom 2022-07-07",
"url": "https://alas.aws.amazon.com/ALAS-2022-1606.html"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404"
},
{
"category": "external",
"summary": "AMD Security Bulletin",
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14775-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14796-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14777-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14800-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14770-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14776-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14797-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RLB6EQ4PQFULA6326VPRQRWW66T32SST/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14787-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14778-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14791-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14804-1 vom 2025-02-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/"
}
],
"source_lang": "en-US",
"title": "AMD Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-02-16T23:00:00.000+00:00",
"generator": {
"date": "2025-02-17T09:16:43.421+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2022-0073",
"initial_release_date": "2022-05-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-05-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-05-12T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2022-05-17T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HPE aufgenommen"
},
{
"date": "2022-05-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2022-05-26T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-02T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-07T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-07-07T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-01-22T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-04-02T22:00:00.000+00:00",
"number": "10",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2024-02-13T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von AMD aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Epyc",
"product": {
"name": "AMD Prozessor Epyc",
"product_id": "T020995",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:epyc"
}
}
},
{
"category": "product_version",
"name": "Ryzen",
"product": {
"name": "AMD Prozessor Ryzen",
"product_id": "T023180",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:ryzen"
}
}
},
{
"category": "product_version",
"name": "Athlon",
"product": {
"name": "AMD Prozessor Athlon",
"product_id": "T023181",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:athlon"
}
}
},
{
"category": "product_name",
"name": "AMD Prozessor",
"product": {
"name": "AMD Prozessor",
"product_id": "T029010",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:-"
}
}
}
],
"category": "product_name",
"name": "Prozessor"
}
],
"category": "vendor",
"name": "AMD"
},
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "HP Computer",
"product": {
"name": "HP Computer",
"product_id": "T023191",
"product_identification_helper": {
"cpe": "cpe:/h:hp:computer:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Lenovo Computer",
"product": {
"name": "Lenovo Computer",
"product_id": "T006520",
"product_identification_helper": {
"cpe": "cpe:/o:lenovo:lenovo_computer:-"
}
}
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12931",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12931"
},
{
"cve": "CVE-2020-12944",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12944"
},
{
"cve": "CVE-2020-12946",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12946"
},
{
"cve": "CVE-2020-12951",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12951"
},
{
"cve": "CVE-2021-0153",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0153"
},
{
"cve": "CVE-2021-0154",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0154"
},
{
"cve": "CVE-2021-0155",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0155"
},
{
"cve": "CVE-2021-0159",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0159"
},
{
"cve": "CVE-2021-0188",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0188"
},
{
"cve": "CVE-2021-0189",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0189"
},
{
"cve": "CVE-2021-0190",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0190"
},
{
"cve": "CVE-2021-21131",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-21131"
},
{
"cve": "CVE-2021-21136",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-21136"
},
{
"cve": "CVE-2021-26312",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26312"
},
{
"cve": "CVE-2021-26317",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26317"
},
{
"cve": "CVE-2021-26335",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26335"
},
{
"cve": "CVE-2021-26336",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26336"
},
{
"cve": "CVE-2021-26337",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26337"
},
{
"cve": "CVE-2021-26339",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26342",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26342"
},
{
"cve": "CVE-2021-26347",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26347"
},
{
"cve": "CVE-2021-26348",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26349",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26349"
},
{
"cve": "CVE-2021-26350",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26350"
},
{
"cve": "CVE-2021-26351",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26351"
},
{
"cve": "CVE-2021-26352",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26352"
},
{
"cve": "CVE-2021-26361",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26361"
},
{
"cve": "CVE-2021-26362",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26362"
},
{
"cve": "CVE-2021-26363",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26363"
},
{
"cve": "CVE-2021-26364",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26366",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26366"
},
{
"cve": "CVE-2021-26368",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26368"
},
{
"cve": "CVE-2021-26369",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26369"
},
{
"cve": "CVE-2021-26372",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26372"
},
{
"cve": "CVE-2021-26373",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26373"
},
{
"cve": "CVE-2021-26375",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-26376",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26376"
},
{
"cve": "CVE-2021-26378",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26378"
},
{
"cve": "CVE-2021-26384",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26384"
},
{
"cve": "CVE-2021-26386",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26386"
},
{
"cve": "CVE-2021-26388",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26388"
},
{
"cve": "CVE-2021-26390",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26390"
},
{
"cve": "CVE-2021-33103",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33103"
},
{
"cve": "CVE-2021-33117",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33117"
},
{
"cve": "CVE-2021-33122",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33122"
},
{
"cve": "CVE-2021-33123",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33123"
},
{
"cve": "CVE-2021-33124",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33124"
},
{
"cve": "CVE-2021-39298",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-39298"
},
{
"cve": "CVE-2022-0005",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2022-0005"
},
{
"cve": "CVE-2022-21151",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2022-21151"
},
{
"cve": "CVE-2023-20558",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2023-20558"
},
{
"cve": "CVE-2023-20559",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2023-20559"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…