cve-2021-26367
Vulnerability from cvelistv5
Published
2024-08-13 16:50
Modified
2024-12-04 16:25
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-26367",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-13T18:04:31.680686Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T16:25:09.987Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4PI  1.0.0.9"
            },
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.8"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PollockPI-FT5  1.0.0.4"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RenoirPI-FP6  1.0.0.7"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  Adrenalin Edition 23.12.1 (23.30.13.01)"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  PRO Edition 23.Q4 (23.30.13.03)"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedR2KPI-FP5 1.0.0.2"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP6 1.0.0.6"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
            }
          ],
          "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:50:05.825Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
        },
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26367",
    "datePublished": "2024-08-13T16:50:05.825Z",
    "dateReserved": "2021-01-29T21:24:26.151Z",
    "dateUpdated": "2024-12-04T16:25:09.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\", \"versionEndExcluding\": \"23.12.1\", \"matchCriteriaId\": \"F71B3286-B679-4DC0-BDD1-784AC5577094\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C66880A-FB33-477D-93FD-C280A4547D66\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CD3F898-5AB1-4E60-A086-ADCF33820154\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"863770A0-3A7F-43E3-98E5-77E42827FA6B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4FED1D5-F31A-44C9-9101-D70486CC6FC7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB12B48-ABF8-4FFB-BD4E-6413C34D477B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2D1C027-56B1-4EA7-842B-09B300B17808\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C24DE61-4036-42BF-A08F-67C234706703\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03D9040F-1D1D-49E5-A60E-4393F5D76B60\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A76A792F-7026-4F29-9A00-3A2EAB2DE5FC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33DAF63F-C468-438C-97C3-B6CE8BD12858\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A82D4745-ACAB-4FC2-A63D-3B0FEA208BED\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD80D674-1DD4-44E0-8C38-8341A7F392B1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10DD7029-9299-4901-A3D1-84D6102471B9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F73C59A-CDE2-4203-921F-1831D4ACFD2A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C980129B-D717-47F7-A6C1-5EB64FB1BF9A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B76C585C-FCC8-456D-A63C-7A769AF5EB07\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49540C5D-CEC7-4BCB-882B-73843CAFD55A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9466279D-0582-464E-AFCC-20872CC99B56\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12EF0B24-689D-4BE8-98D5-D88A84D5E473\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB218988-1483-4D96-9075-F79EDBC79974\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F14D5A16-F7BE-427A-98AB-2E120DB756DC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC4A007-BEFD-4BF0-A176-7ECD6150041C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\", \"versionEndIncluding\": \"23.q4\", \"matchCriteriaId\": \"4397FD7C-3357-4F01-98F4-131000D23AA0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85E68F7E-0A57-498A-9DB9-3D36045D671E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DB91262-2EF4-4F0D-8B61-0012BD25E7A8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3083C065-5A2C-4B2D-9C1F-5793BA3C0A52\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7557738A-5D93-4117-8FF2-9A27CD0E6BC5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"cezannepi-fp6_1.0.0.6\", \"matchCriteriaId\": \"B1EFDD49-95E7-4E92-A476-9F7E9D2B222A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9921AE2D-F497-47C8-B463-947E230CF4F0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"799912F4-2A5D-41F6-B645-5972B966617B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2452A625-5B59-49DF-A3C3-872642181E9D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"1D7DEDAC-51F3-4B72-8958-72CFDB8572A0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"533144EB-802F-496D-8C09-15AEA537F89B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"E25EF8F6-B5F3-478C-9AB5-60B29497D2F7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B16B55B-11B3-43DB-860A-62CD3020B536\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"15FE9FAE-DEC6-42FA-8622-3D5B0C845928\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8C6F103-30CC-4738-B489-B12790836B1A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"3770F180-FB7C-410F-B49D-D30AA05326BC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE2EC993-8A65-416B-939F-1C707D596AF9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"6CC0AC2E-CA16-46E5-A703-8DCD3EF82425\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"EF809F01-E6B3-4975-AC8B-EE2FDD199B14\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C03B5C8-9337-422B-9474-08EBBD0E0A45\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"228E3FBD-F997-402D-AE96-B14D66390700\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"4F2AC7D6-47AB-4178-9585-34293B36F576\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2293F6A-ECB3-462B-9CB6-1DF0EF43A816\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E11A9D-03EC-4014-BB1C-5286C694581B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"C05D78A9-2CED-4BA1-8382-BC8D722E91D9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E514E0C-397F-4DF3-AD79-D7C800BAA28A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"8233A5D0-7796-4164-99CF-BB23B74563DF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEE30066-A56C-4997-BED2-FEB4F61D9F09\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"03194384-10A2-4B6D-BED1-C01908249969\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CFF28BE-F049-4716-AADE-643FABB753A7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"03BCFD6B-04D1-4A27-AB06-90F8BA894E2C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"754DE9E2-F441-4D7F-BDAB-6ADED0F9D76A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"951CA892-BAE2-46A4-BC86-0A205A4FA218\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4pi_1.0.0.9\", \"matchCriteriaId\": \"A192415A-41F1-4DF9-A351-A6E879E45431\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE0FB0AF-E942-4257-A9F2-8077A753A169\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4pi_1.0.0.9\", \"matchCriteriaId\": \"76F10B69-9959-4977-893B-076BFBAC1BA6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AE68ECE-5298-4BC1-AC24-5CF613389CDC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4pi_1.0.0.9\", \"matchCriteriaId\": \"7217BA72-D101-49C1-86B7-A63BFA01A056\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E09DC414-96EE-478E-847C-7ACB5915659B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4pi_1.0.0.9\", \"matchCriteriaId\": \"045D34B9-50A3-453D-A9E1-64180D1E1B5C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F521757-7ABC-4CEB-AD06-2FD738216E8E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"C52E5C9A-DC2E-428F-97CF-61C7340C0579\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"492017EE-C13F-4C40-887F-9C3C9F439898\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"62AB8A11-9C17-4528-A582-8340964C76A7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1614C8C2-0DDF-464F-BAE5-812CED10CA17\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"5E240139-34E9-4D68-AEBB-6E641C75AB82\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D640C5C-C906-41A2-96BC-19299ADB9446\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"1B184CA4-DA2E-4EF7-997C-BA563CB41A08\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BE6DAAF-7A5E-4D6C-862A-443647E66432\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"40EDD65C-1101-4F0C-AD08-007A97D7184E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0005355A-DA7A-417D-8AF9-F6CC880040BC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"6DCE8037-1ED8-468A-9FBF-B79809A8089A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B44C21E-681A-4869-8D9D-D3898D9CBB3B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"B2201670-E611-4C1E-BD06-E2B4262C3687\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94E19774-C744-46AC-B8F8-2B3E2BB19050\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"7B0598FA-5EB7-41FF-AC46-BFBCE1EA1271\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D34308FA-D6D1-4024-95F5-45C86EFBF00A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"1C51F223-5529-4D10-A7AF-44198DE58684\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F59A2AF2-5D13-480B-93CD-70AB6AEB60F5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"35C8C0CE-AA13-434D-83BD-2DA454B1937C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"E5A8225E-A53A-4602-ACF6-F142D1CCF9FD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"comboam4v2_pi_1.2.0.5\", \"matchCriteriaId\": \"BF3486C1-EAD5-4861-8463-506D59A5F7DA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6746407-9EC7-49B2-93B4-926174F2A457\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.\"}, {\"lang\": \"es\", \"value\": \"Un atacante malicioso en x86 puede configurar mal las regiones de memoria confiable (TMR), lo que puede permitirle establecer un rango de direcciones arbitrario para la TMR, lo que podr\\u00eda provocar una p\\u00e9rdida de integridad y disponibilidad.\"}]",
      "id": "CVE-2021-26367",
      "lastModified": "2024-12-12T20:41:56.120",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@amd.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H\", \"baseScore\": 5.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.5, \"impactScore\": 5.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H\", \"baseScore\": 6.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.2}]}",
      "published": "2024-08-13T17:15:17.360",
      "references": "[{\"url\": \"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\", \"source\": \"psirt@amd.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html\", \"source\": \"psirt@amd.com\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@amd.com",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-26367\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2024-08-13T17:15:17.360\",\"lastModified\":\"2024-12-12T20:41:56.120\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.\"},{\"lang\":\"es\",\"value\":\"Un atacante malicioso en x86 puede configurar mal las regiones de memoria confiable (TMR), lo que puede permitirle establecer un rango de direcciones arbitrario para la TMR, lo que podr\u00eda provocar una p\u00e9rdida de integridad y disponibilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@amd.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\",\"versionEndExcluding\":\"23.12.1\",\"matchCriteriaId\":\"F71B3286-B679-4DC0-BDD1-784AC5577094\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C66880A-FB33-477D-93FD-C280A4547D66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD3F898-5AB1-4E60-A086-ADCF33820154\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863770A0-3A7F-43E3-98E5-77E42827FA6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FED1D5-F31A-44C9-9101-D70486CC6FC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB12B48-ABF8-4FFB-BD4E-6413C34D477B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2D1C027-56B1-4EA7-842B-09B300B17808\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C24DE61-4036-42BF-A08F-67C234706703\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D9040F-1D1D-49E5-A60E-4393F5D76B60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A76A792F-7026-4F29-9A00-3A2EAB2DE5FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33DAF63F-C468-438C-97C3-B6CE8BD12858\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82D4745-ACAB-4FC2-A63D-3B0FEA208BED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD80D674-1DD4-44E0-8C38-8341A7F392B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10DD7029-9299-4901-A3D1-84D6102471B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F73C59A-CDE2-4203-921F-1831D4ACFD2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C980129B-D717-47F7-A6C1-5EB64FB1BF9A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76C585C-FCC8-456D-A63C-7A769AF5EB07\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49540C5D-CEC7-4BCB-882B-73843CAFD55A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9466279D-0582-464E-AFCC-20872CC99B56\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12EF0B24-689D-4BE8-98D5-D88A84D5E473\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB218988-1483-4D96-9075-F79EDBC79974\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14D5A16-F7BE-427A-98AB-2E120DB756DC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC4A007-BEFD-4BF0-A176-7ECD6150041C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\",\"versionEndIncluding\":\"23.q4\",\"matchCriteriaId\":\"4397FD7C-3357-4F01-98F4-131000D23AA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85E68F7E-0A57-498A-9DB9-3D36045D671E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB91262-2EF4-4F0D-8B61-0012BD25E7A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3083C065-5A2C-4B2D-9C1F-5793BA3C0A52\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7557738A-5D93-4117-8FF2-9A27CD0E6BC5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.6\",\"matchCriteriaId\":\"B1EFDD49-95E7-4E92-A476-9F7E9D2B222A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9921AE2D-F497-47C8-B463-947E230CF4F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"799912F4-2A5D-41F6-B645-5972B966617B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2452A625-5B59-49DF-A3C3-872642181E9D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"1D7DEDAC-51F3-4B72-8958-72CFDB8572A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533144EB-802F-496D-8C09-15AEA537F89B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"E25EF8F6-B5F3-478C-9AB5-60B29497D2F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B16B55B-11B3-43DB-860A-62CD3020B536\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"15FE9FAE-DEC6-42FA-8622-3D5B0C845928\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C6F103-30CC-4738-B489-B12790836B1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"3770F180-FB7C-410F-B49D-D30AA05326BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2EC993-8A65-416B-939F-1C707D596AF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"6CC0AC2E-CA16-46E5-A703-8DCD3EF82425\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"EF809F01-E6B3-4975-AC8B-EE2FDD199B14\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C03B5C8-9337-422B-9474-08EBBD0E0A45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228E3FBD-F997-402D-AE96-B14D66390700\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"4F2AC7D6-47AB-4178-9585-34293B36F576\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2293F6A-ECB3-462B-9CB6-1DF0EF43A816\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E11A9D-03EC-4014-BB1C-5286C694581B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"C05D78A9-2CED-4BA1-8382-BC8D722E91D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E514E0C-397F-4DF3-AD79-D7C800BAA28A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"8233A5D0-7796-4164-99CF-BB23B74563DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE30066-A56C-4997-BED2-FEB4F61D9F09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"03194384-10A2-4B6D-BED1-C01908249969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF28BE-F049-4716-AADE-643FABB753A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"03BCFD6B-04D1-4A27-AB06-90F8BA894E2C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"754DE9E2-F441-4D7F-BDAB-6ADED0F9D76A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"951CA892-BAE2-46A4-BC86-0A205A4FA218\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4pi_1.0.0.9\",\"matchCriteriaId\":\"A192415A-41F1-4DF9-A351-A6E879E45431\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0FB0AF-E942-4257-A9F2-8077A753A169\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4pi_1.0.0.9\",\"matchCriteriaId\":\"76F10B69-9959-4977-893B-076BFBAC1BA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE68ECE-5298-4BC1-AC24-5CF613389CDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4pi_1.0.0.9\",\"matchCriteriaId\":\"7217BA72-D101-49C1-86B7-A63BFA01A056\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09DC414-96EE-478E-847C-7ACB5915659B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4pi_1.0.0.9\",\"matchCriteriaId\":\"045D34B9-50A3-453D-A9E1-64180D1E1B5C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F521757-7ABC-4CEB-AD06-2FD738216E8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"C52E5C9A-DC2E-428F-97CF-61C7340C0579\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"492017EE-C13F-4C40-887F-9C3C9F439898\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"62AB8A11-9C17-4528-A582-8340964C76A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1614C8C2-0DDF-464F-BAE5-812CED10CA17\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"5E240139-34E9-4D68-AEBB-6E641C75AB82\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D640C5C-C906-41A2-96BC-19299ADB9446\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"1B184CA4-DA2E-4EF7-997C-BA563CB41A08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE6DAAF-7A5E-4D6C-862A-443647E66432\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"40EDD65C-1101-4F0C-AD08-007A97D7184E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0005355A-DA7A-417D-8AF9-F6CC880040BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"6DCE8037-1ED8-468A-9FBF-B79809A8089A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B44C21E-681A-4869-8D9D-D3898D9CBB3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"B2201670-E611-4C1E-BD06-E2B4262C3687\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E19774-C744-46AC-B8F8-2B3E2BB19050\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"7B0598FA-5EB7-41FF-AC46-BFBCE1EA1271\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34308FA-D6D1-4024-95F5-45C86EFBF00A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"1C51F223-5529-4D10-A7AF-44198DE58684\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F59A2AF2-5D13-480B-93CD-70AB6AEB60F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"35C8C0CE-AA13-434D-83BD-2DA454B1937C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"E5A8225E-A53A-4602-ACF6-F142D1CCF9FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"BF3486C1-EAD5-4861-8463-506D59A5F7DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6746407-9EC7-49B2-93B4-926174F2A457\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-26367\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-13T18:04:31.680686Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-13T18:04:38.433Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 5000 Series Desktop Processor with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"ComboAM4v2 PI 1.2.0.5\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Athlon\\u2122 3000 Series Desktop Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"ComboAM4PI  1.0.0.9\"}, {\"status\": \"unaffected\", \"version\": \"ComboAM4v2 PI 1.2.0.8\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 4000 Series Desktop Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"ComboAM4v2 PI 1.2.0.5\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Athlon\\u2122 3000 Series Mobile  Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"PicassoPI-FP5  1.0.0.E\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Athlon\\u2122 3000 Series Mobile  Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"PollockPI-FT5  1.0.0.4\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 3000 Series Mobile Processor with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"PicassoPI-FP5  1.0.0.E\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 4000 Series Mobile Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"RenoirPI-FP6  1.0.0.7\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 5000 Series Mobile Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"CezannePI-FP6 1.0.0.6\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 5000 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"CezannePI-FP6 1.0.0.6\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 3000 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"CezannePI-FP6 1.0.0.6\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 5000 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"CezannePI-FP6 1.0.0.6\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 3000 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"CezannePI-FP6 1.0.0.6\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Radeon\\u2122 RX 6000 Series Graphics Cards\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"AMD Software:  Adrenalin Edition 23.12.1 (23.30.13.01)\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Radeon\\u2122 PRO W6000 Series Graphics Cards\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"AMD Software:  PRO Edition 23.Q4 (23.30.13.03)\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 Embedded R1000 Series Processors\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"EmbeddedPI-FP5 1.2.0.A\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 Embedded R2000 Series Processors\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"EmbeddedR2KPI-FP5 1.0.0.2\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 Embedded V1000 Series Processors\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"EmbeddedPI-FP5 1.2.0.A\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 Embedded V2000 Series Processors\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"EmbeddedPI-FP6 1.0.0.6\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\"}, {\"url\": \"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"shortName\": \"AMD\", \"dateUpdated\": \"2024-08-13T16:50:05.825Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-26367\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-04T16:25:09.987Z\", \"dateReserved\": \"2021-01-29T21:24:26.151Z\", \"assignerOrgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"datePublished\": \"2024-08-13T16:50:05.825Z\", \"assignerShortName\": \"AMD\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.