cve-2021-26384
Vulnerability from cvelistv5
Published
2022-07-14 19:28
Modified
2024-09-16 23:15
Severity ?
Summary
A malformed SMI (System Management Interface) command may allow an attacker to establish a corrupted SMI Trigger Info data structure, potentially leading to out-of-bounds memory reads and writes when triggering an SMI resulting in a potential loss of resources.
Impacted products
Vendor Product Version
AMD Athlon™ Series Version: various
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.316Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A malformed SMI (System Management Interface) command may allow an attacker to establish a corrupted SMI Trigger Info data structure, potentially leading to out-of-bounds memory reads and writes when triggering an SMI resulting in a potential loss of resources."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-07-14T19:28:56",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26384",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A malformed SMI (System Management Interface) command may allow an attacker to establish a corrupted SMI Trigger Info data structure, potentially leading to out-of-bounds memory reads and writes when triggering an SMI resulting in a potential loss of resources."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26384",
    "datePublished": "2022-07-14T19:28:56.918810Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T23:15:36.383Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-26384\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2022-07-14T20:15:08.293\",\"lastModified\":\"2024-11-21T05:56:15.767\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A malformed SMI (System Management Interface) command may allow an attacker to establish a corrupted SMI Trigger Info data structure, potentially leading to out-of-bounds memory reads and writes when triggering an SMI resulting in a potential loss of resources.\"},{\"lang\":\"es\",\"value\":\"Un comando SMI (System Management Interface) malformado puede permitir a un atacante establecer una estructura de datos SMI Trigger Info corrupta,  conllevando potencialmente a lecturas y escrituras de memoria fuera de l\u00edmites cuando es desencadenado un SMI resultando en una potencial p\u00e9rdida de recursos\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"},{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4_v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"CC7064C1-67AF-4A2F-A284-846700D45614\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6746407-9EC7-49B2-93B4-926174F2A457\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4_v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"80081A6A-9B1F-4995-B7ED-FF297CB98264\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4_v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"F0CBE28F-9DF5-4D9C-BCC2-0D2ACB9D6B8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4_v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"439D9E75-CB06-4F8C-A10E-0A398B0BF699\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F59A2AF2-5D13-480B-93CD-70AB6AEB60F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4_v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"462E0C21-B8D7-40CD-812F-3DACC77F13BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34308FA-D6D1-4024-95F5-45C86EFBF00A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4_v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"1D53236B-5DD1-486A-93C1-52AD9B0C4B3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E19774-C744-46AC-B8F8-2B3E2BB19050\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"E36A1096-E2AF-4F0D-BD52-527AA7E59B56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"372D68C2-87E3-436C-96A0-E2855AAFD910\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C00179A-620B-4DC7-893A-11AFAB9EE13C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"8FE756D6-6BE7-45F3-A40D-46CB74EFD6A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF398C51-EB53-4C3F-8D88-BD3931D9293F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"9CD4943E-9B99-4EDB-B9EF-75F15B097FFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9BDB04-877C-472D-A3BB-6C32FF269E00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"E0E6BA3E-FDA4-4996-B3AC-508D7EC1FC08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE64730D-B284-450E-9450-72AAEBAE2000\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"CE6F717B-9CE2-4AB9-85C8-FADE9256BC03\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBB31D3-58CA-44EE-B115-77D1D83D9E23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"91F6E921-B63E-419D-BEFC-29C92832A44F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1449EC-F9D9-4846-A6E1-56F0B1EE8849\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"6FB62DD2-2352-43D6-87F4-53FC84DA80AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16BC515-84AE-432F-853B-822E737C242F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"E1E154A8-DA3F-4E87-8C41-DA9465288BD0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"570DB781-C169-421B-9D07-9E947918DDC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAED3E10-E29A-41E8-9758-C0DEEB13D630\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"D7C7B5DC-98A4-4966-A41B-B6A1C655B1A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5FDA44-978A-4ACC-9A42-00929DFE485B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"BE644693-0BFE-49D2-AE58-79D52B110169\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD963142-F19B-42C9-AB46-8F24CD773BE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"BAC0EB2D-0AC1-4F0D-9D48-94C039E16579\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A09152-93D2-493D-8CE0-8A4F30F0DD39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"5FD0DEC3-6D14-43DB-9FE7-AEDF42C547A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D64E8F-BB90-4425-9980-9D2E2B74E83B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"D4C2DF5C-5BF9-42AF-A2FB-F1EC7F3B5BFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94BB2CE6-E989-43EE-B501-0DA6079BA420\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"D09CDB5E-3184-49DF-AC0E-367D0EFF0E36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74236755-56DA-4245-A07F-DF9817D8F01D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"E75C6409-DC89-44AA-B7A6-C080281B35DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962E91F5-037B-4532-A5DB-FCC01631666F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"17F026FB-D58E-4A61-87E7-249B3E0B1293\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1390DB-9E89-4C57-93F7-06B36EFDE579\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.9\",\"matchCriteriaId\":\"5A274267-5A91-4752-856F-3F84D85BB9CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F962DD-90D5-47AB-8ABC-36E925821636\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF28BE-F049-4716-AADE-643FABB753A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610909ED-A636-4007-A50F-500057340E70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E11A9D-03EC-4014-BB1C-5286C694581B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02B85FAD-49E4-4DE4-BF8B-88F3C9772779\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8921CB70-EE2E-4E18-8E6C-52B505E2D2E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B1F092-A9EA-4245-A154-2DFEA5D2A01F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C29793-1142-4506-8C32-3B89227BB3A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9921AE2D-F497-47C8-B463-947E230CF4F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2452A625-5B59-49DF-A3C3-872642181E9D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3450u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62D1862B-8C77-4FBF-AA6D-EA3308311118\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3450u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7888EB-C587-44BF-95AC-05BE7776B5F8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6245B6C-1BAD-4877-9921-16E32466708A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C84A1505-E6CB-431C-B44D-1E26045F30B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3500c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57A170DB-7E2C-4709-B1BC-E5C367BFB8A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3500c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B3D9C3E-F342-4932-8287-844E1963D572\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3550h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"813B1750-DC92-46A5-BF2B-041DBA196968\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3550h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"695A2D6B-A46C-475F-809F-B2715A41A936\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3580u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4518EEA9-2C4D-4615-A0F5-CF40C80285E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3580u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2CD9B5-7469-4B8A-8653-4C71B00D0D2E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3700u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D27255DA-3451-492D-BC8C-F0ABD9746250\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"658FF986-FD92-487B-A7FA-43E1F96B0FEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3700c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC59D0E5-A610-47D9-9820-6D5DA71C4FC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3700c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7FCAE2-1695-405A-AF62-9C9324BBCE09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3750h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21782BC7-E2F5-4377-B80A-56591F3D7C25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9397E5A5-0694-4016-AEBC-41D7902F9A03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3780u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C31FA9-3DED-4794-8BB9-DCAD9F9FA9A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3780u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D51558-9F26-43D3-8BCB-4CD9A3DD7004\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"262E6ECB-AAA9-4DFF-A7A2-C4457087A49F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA61ADB-2FEA-459A-BF4F-C55401479107\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"51CC1E13-BED2-4CE5-9BDF-D177B788E5A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FF5F66-636C-4637-96F7-0FA45BB7C64B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"5B745B7F-DDD9-4DAF-8511-76F2C4F7FA20\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BEE640-381F-449B-ACB1-F1BD255683C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"AA918714-FB83-42E4-87FE-2DAD5730193E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC4BECA-6023-4225-9685-937E47C67C1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"AEB99535-B654-4F63-A30A-F51FF934694B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D2C602-8086-4FC4-AE89-0842A453E56E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"6BEA11AE-B6BD-45B9-B286-68A21641E6D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D777E18-B7ED-42CF-A2C4-87426B04E8EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2700_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"D5AAC34F-CE36-43D3-B4BA-0DC1E188D0B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237AB35F-1702-418D-8193-F8B387B7F644\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2700x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"272E5E53-54B5-4404-AB0F-842425AD6DC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C5EE04-23BC-48E6-A171-D63C8258E317\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"CDA5C1B3-E63C-4704-9A3E-0664430106DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D7F33C-F522-4A20-9055-1662178D7F27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"0989D19D-9721-47AF-B4F1-3DAFE98FE52A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DBF39F8-2317-432A-846D-7FEC2C35EEE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"2B40FD73-40E5-4218-8897-8E3336B84D6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.6c\",\"matchCriteriaId\":\"11D0D05F-B73B-48D7-8341-EF9C1B9B413F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9825AB7C-7675-4364-BCE3-4C63BD41780A\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.