cve-2022-23815
Vulnerability from cvelistv5
Published
2024-08-13 16:51
Modified
2024-08-19 17:17
Severity ?
EPSS score ?
Summary
Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html | Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "athlon_3000g", "vendor": "amd", "versions": [ { "status": "affected", "version": "various" }, { "status": "unaffected", "version": "1.0.0.F" }, { "status": "unaffected", "version": "1.0.0.5" }, { "status": "unaffected", "version": "1.0.0.E" } ] }, { "cpes": [ "cpe:2.3:a:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_embedded_r1000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.2.0.A" } ] }, { "cpes": [ "cpe:2.3:a:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_embedded_r2000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.2" } ] }, { "cpes": [ "cpe:2.3:a:amd:ryzen_embedded_v1000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_embedded_v1000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.2.0.A" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-23815", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-19T17:04:47.953819Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-19T17:17:18.251Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various", "versionType": "PI" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PicassoPI-FP5 1.0.0.F" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PollockPI-FT5 1.0.0.5" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PicassoPI-FP5 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD RyzenTM Embedded R1000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP5 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD RyzenTM Embedded R2000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedR2KPI-FP5 1.0.0.2" } ] }, { "defaultStatus": "affected", "product": "AMD RyzenTM Embedded V1000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP5 1.2.0.A" } ] } ], "datePublic": "2024-08-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:51:43.735Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2022-23815", "datePublished": "2024-08-13T16:51:43.735Z", "dateReserved": "2022-01-21T17:14:12.301Z", "dateUpdated": "2024-08-19T17:17:18.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"03194384-10A2-4B6D-BED1-C01908249969\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CFF28BE-F049-4716-AADE-643FABB753A7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E11A9D-03EC-4014-BB1C-5286C694581B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"228E3FBD-F997-402D-AE96-B14D66390700\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"1D532BCD-50E7-41AC-91D3-A0135F2266EE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BE1C3A6-06F5-4448-B7BE-54EED3672BBB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"6CC0AC2E-CA16-46E5-A703-8DCD3EF82425\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"3770F180-FB7C-410F-B49D-D30AA05326BC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE2EC993-8A65-416B-939F-1C707D596AF9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"15FE9FAE-DEC6-42FA-8622-3D5B0C845928\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8C6F103-30CC-4738-B489-B12790836B1A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"E25EF8F6-B5F3-478C-9AB5-60B29497D2F7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9921AE2D-F497-47C8-B463-947E230CF4F0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"FD8FA542-D8A5-4C7F-BF80-E79CE90D7D76\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0C29793-1142-4506-8C32-3B89227BB3A6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"picassopi-fp5_1.0.0.e\", \"matchCriteriaId\": \"F6F0F843-A668-4BA3-9111-491BD115E0DA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8921CB70-EE2E-4E18-8E6C-52B505E2D2E3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"420E8314-35B8-4A12-AD42-3914EBA51D4D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE0FB0AF-E942-4257-A9F2-8077A753A169\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD375C2E-B976-4DAE-BF89-EFED1482DB28\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AE68ECE-5298-4BC1-AC24-5CF613389CDC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D689C088-F1F1-4368-B6AE-75D3F9582FB1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E09DC414-96EE-478E-847C-7ACB5915659B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52DFA8C8-AD16-45B1-934F-AEE78C51DDAC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F521757-7ABC-4CEB-AD06-2FD738216E8E\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\"}, {\"lang\": \"es\", \"value\": \"Una verificaci\\u00f3n de los l\\u00edmites inadecuada en el firmware APCB puede permitir que un atacante realice una escritura fuera de los l\\u00edmites, corrompiendo la entrada APCB y potencialmente llevando a la ejecuci\\u00f3n de c\\u00f3digo arbitrario.\"}]", "id": "CVE-2022-23815", "lastModified": "2025-01-03T18:04:08.963", "metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@amd.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.5, \"impactScore\": 6.0}]}", "published": "2024-08-13T17:15:18.197", "references": "[{\"url\": \"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\", \"source\": \"psirt@amd.com\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2022-23815\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2024-08-13T17:15:18.197\",\"lastModified\":\"2025-01-03T18:04:08.963\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Una verificaci\u00f3n de los l\u00edmites inadecuada en el firmware APCB puede permitir que un atacante realice una escritura fuera de los l\u00edmites, corrompiendo la entrada APCB y potencialmente llevando a la ejecuci\u00f3n de c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@amd.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"03194384-10A2-4B6D-BED1-C01908249969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF28BE-F049-4716-AADE-643FABB753A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E11A9D-03EC-4014-BB1C-5286C694581B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228E3FBD-F997-402D-AE96-B14D66390700\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"1D532BCD-50E7-41AC-91D3-A0135F2266EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE1C3A6-06F5-4448-B7BE-54EED3672BBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"6CC0AC2E-CA16-46E5-A703-8DCD3EF82425\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"3770F180-FB7C-410F-B49D-D30AA05326BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2EC993-8A65-416B-939F-1C707D596AF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"15FE9FAE-DEC6-42FA-8622-3D5B0C845928\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C6F103-30CC-4738-B489-B12790836B1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"E25EF8F6-B5F3-478C-9AB5-60B29497D2F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9921AE2D-F497-47C8-B463-947E230CF4F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"FD8FA542-D8A5-4C7F-BF80-E79CE90D7D76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C29793-1142-4506-8C32-3B89227BB3A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"F6F0F843-A668-4BA3-9111-491BD115E0DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8921CB70-EE2E-4E18-8E6C-52B505E2D2E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"420E8314-35B8-4A12-AD42-3914EBA51D4D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0FB0AF-E942-4257-A9F2-8077A753A169\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD375C2E-B976-4DAE-BF89-EFED1482DB28\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE68ECE-5298-4BC1-AC24-5CF613389CDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D689C088-F1F1-4368-B6AE-75D3F9582FB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09DC414-96EE-478E-847C-7ACB5915659B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52DFA8C8-AD16-45B1-934F-AEE78C51DDAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F521757-7ABC-4CEB-AD06-2FD738216E8E\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-23815\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-19T17:04:47.953819Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"athlon_3000g\", \"versions\": [{\"status\": \"affected\", \"version\": \"various\"}, {\"status\": \"unaffected\", \"version\": \"1.0.0.F\"}, {\"status\": \"unaffected\", \"version\": \"1.0.0.5\"}, {\"status\": \"unaffected\", \"version\": \"1.0.0.E\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_embedded_r1000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1.2.0.A\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_embedded_r2000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1.0.0.2\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:amd:ryzen_embedded_v1000:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_embedded_v1000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1.2.0.A\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-19T17:08:55.731Z\"}}], \"cna\": {\"source\": {\"advisory\": \"AMD-SB-4002, AMD-SB-3002, AMD-SB-5001\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"AMD\", \"product\": \"AMD Athlon\\u2122 3000 Series Desktop Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various\", \"versionType\": \"PI\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Athlon\\u2122 3000 Series Mobile Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"PicassoPI-FP5 1.0.0.F\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Athlon\\u2122 3000 Series Mobile Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"PollockPI-FT5 1.0.0.5\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 3000 Series Mobile Processor with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"PicassoPI-FP5 1.0.0.E\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD RyzenTM Embedded R1000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"EmbeddedPI-FP5 1.2.0.A\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD RyzenTM Embedded R2000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"EmbeddedR2KPI-FP5 1.0.0.2\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD RyzenTM Embedded V1000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"EmbeddedPI-FP5 1.2.0.A\"}], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2024-08-13T16:00:00.000Z\", \"references\": [{\"url\": \"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eImproper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\\n\\n\u003c/div\u003e\\n\\n\u003c/div\u003e\\n\\n\u003c/div\u003e\\n\\n\\n\\n\\n\\n\u003c/span\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"shortName\": \"AMD\", \"dateUpdated\": \"2024-08-13T16:51:43.735Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-23815\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-19T17:17:18.251Z\", \"dateReserved\": \"2022-01-21T17:14:12.301Z\", \"assignerOrgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"datePublished\": \"2024-08-13T16:51:43.735Z\", \"assignerShortName\": \"AMD\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.