cve-2023-20598
Vulnerability from cvelistv5
Published
2023-10-17 13:26
Modified
2024-08-02 09:05
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "radeon_rx_5300_xt",
            "vendor": "amd",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_5_7645hx",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_9_pro_7945",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20598",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-27T17:12:05.139002Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-269",
                "description": "CWE-269 Improper Privilege Management",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-27T17:12:23.788Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.253Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 RX 5000 Series Graphics Cards",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 RX 6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 RX 7000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 PRO W5000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 PRO W6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 PRO W7000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Ryzen\u2122 7045 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": " Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Ryzen\u2122 7040 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Ryzen\u2122 7000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-10-16T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\n\n\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eAn improper privilege management in the AMD Radeon\u2122\u003c/span\u003e\u0026nbsp;\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eGraphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\u003c/span\u003e\n\n\n\n"
            }
          ],
          "value": "\n\n\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T13:26:21.731Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009"
        }
      ],
      "source": {
        "advisory": "\u202f\u202fAMD-SB-6009",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20598",
    "datePublished": "2023-10-17T13:26:21.731Z",
    "dateReserved": "2022-10-27T18:53:39.763Z",
    "dateUpdated": "2024-08-02T09:05:36.253Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-20598\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2023-10-17T14:15:09.813\",\"lastModified\":\"2024-07-03T01:39:18.680\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\n\\n\\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\\n\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Una gesti\u00f3n de privilegios inadecuada en el controlador de gr\u00e1ficos AMD Radeon\u2122 puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones f\u00edsicas arbitrarias, lo que resulta en una posible ejecuci\u00f3n de c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9995FBE-D440-45BA-86B5-1CFADF5BEE2B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6289D311-1997-47E7-B8D9-75C27CD0B9D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02AA337B-595F-4859-A82A-DEC7BB346773\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F08BE928-65AA-4E21-A8F0-D013C8FFB693\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1952152-A184-4FC9-B1CC-008B8238B5ED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D51EA58C-3684-4567-A213-9351F2E521B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0026781-F1DA-4533-870E-BCA14CFC7005\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB84A38-F651-44CB-93EF-502F1A197FBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEDC946-3685-4533-8D97-BDBDFB7AACBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C66880A-FB33-477D-93FD-C280A4547D66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD3F898-5AB1-4E60-A086-ADCF33820154\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863770A0-3A7F-43E3-98E5-77E42827FA6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FED1D5-F31A-44C9-9101-D70486CC6FC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB12B48-ABF8-4FFB-BD4E-6413C34D477B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2D1C027-56B1-4EA7-842B-09B300B17808\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C24DE61-4036-42BF-A08F-67C234706703\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D9040F-1D1D-49E5-A60E-4393F5D76B60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A76A792F-7026-4F29-9A00-3A2EAB2DE5FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33DAF63F-C468-438C-97C3-B6CE8BD12858\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82D4745-ACAB-4FC2-A63D-3B0FEA208BED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD80D674-1DD4-44E0-8C38-8341A7F392B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10DD7029-9299-4901-A3D1-84D6102471B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F73C59A-CDE2-4203-921F-1831D4ACFD2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C980129B-D717-47F7-A6C1-5EB64FB1BF9A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76C585C-FCC8-456D-A63C-7A769AF5EB07\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB37AAC-3957-4840-B47E-ED678F0B6044\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA1DA067-DE94-4663-91CD-A70CC386D45A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9466279D-0582-464E-AFCC-20872CC99B56\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12EF0B24-689D-4BE8-98D5-D88A84D5E473\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14D5A16-F7BE-427A-98AB-2E120DB756DC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC4A007-BEFD-4BF0-A176-7ECD6150041C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"838BCF03-8959-4B8F-96B2-416B880F33DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33D5FFA6-9D23-4C95-B23D-F50EB60369CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"730BD289-75E3-4365-A0C1-D0AD1498F3C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A2E6B9-ADFB-4790-917B-9679CFE280E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"334FD5E4-BA45-42BA-B1EC-0DC1E1F44018\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6B0E69-D944-48CF-A3F3-EA350C1451AF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EDBF76B-3C2E-4421-800B-54CE6A997439\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72B69860-0C6F-40AD-8696-6150365D908F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFE5253-2401-4EE4-90E7-9459F2A93CF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\",\"versionEndExcluding\":\"23.9.2\",\"matchCriteriaId\":\"7162DB91-6B5C-4575-A8D0-B83B34908BE5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39052CC-CC5F-4782-9CCE-2F5C8342AD79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85E68F7E-0A57-498A-9DB9-3D36045D671E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB91262-2EF4-4F0D-8B61-0012BD25E7A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3083C065-5A2C-4B2D-9C1F-5793BA3C0A52\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7557738A-5D93-4117-8FF2-9A27CD0E6BC5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ED51D4C-2C19-4C3B-814C-3F88AF25870C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98B858C0-0490-4D50-BC1E-FFB5A54E5DBC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF5CD86-64D3-4F02-9971-AC50E8052986\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\",\"versionEndExcluding\":\"23.q4\",\"matchCriteriaId\":\"2841E9B4-728C-4201-AAF1-3250A1DC08F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F04B9F-8C65-476B-B5D8-18CC96E3B712\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"495E436C-B0EE-4B72-AB49-332F4752C140\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C4FDE72-050C-4A72-A4F4-9C1D5273CADD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D260012-5D8F-4B36-8B88-82DB0291EE9D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"025E494E-953E-426E-BE89-6F2360A3AAC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1232B034-1214-4F9A-823D-DC76D5C5956B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0870FBE4-92B4-4717-88B0-EC1094268034\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE36D471-57BF-4385-A825-029F7313E4DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"082BE536-F29C-4A73-B030-A19DD3A448B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6740A06F-4512-427D-9CB9-A4A6DB046BA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C05D51F-469D-487D-9FC8-E1AD699A6F74\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC5E111-A7AA-4A45-A2E3-47013F9135D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5D5B25-F32A-493E-BD54-57098981E15A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3657C6-1047-4CA9-8D44-C7143F7D877D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2787C72-42D5-42B0-BE5B-E548B319BCF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09B085FF-EAEA-42BC-BA60-3AA9B76141B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760F20CC-9034-462C-A25E-C009E2218C38\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D2CBCEA-AB4F-444C-9CCD-A976003F796C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76121981-8DC2-4779-833E-4B15CFCF7FC3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225E8405-04FF-4885-92C8-8581ACC66E06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D50E8EA-ECB2-463D-BA51-D13CF5A02266\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69289284-2ED2-4D8B-8AE2-B835AAF31EAD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA6CD984-A8C7-4B23-8FF9-896C503EBA37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D0429F-F186-4F78-9AE0-574E3A39926D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00DEBFA8-6007-4EAE-AD11-6D477ADE4E63\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8480A7E0-882C-4B03-ADBC-697304B0B7C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA29FE4D-C9A2-46FB-8EC5-3067F56ED080\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B21FB338-F944-40F9-8F0C-99B471AAD51E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3674D656-9623-4B39-AADE-158FE70FF29F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD27234D-ACFC-4144-8980-2B706822C579\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5602B902-9FDB-4946-BE4C-236262285F2F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA666DF3-C5F3-4127-A8EE-B784DD41F642\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86CAA682-9666-4929-B1AC-D9DB3109DB1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A7E6806-A7AC-4C96-960B-B8934CEA2439\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74DD4A40-B712-4B54-9CC7-0BFD79E917BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82CCEE11-392D-4486-A6AD-CB64FB8B7081\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6C7D37-C94B-4301-8C0A-5A00B3569D6E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F05C8669-6348-4A1B-B1D4-D22022E1F67E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"018A02C9-2A5C-43E2-8CCD-4D03C119C22B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3DE32CA-168F-4812-AEAE-D771EB01E15D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\",\"versionEndExcluding\":\"23.9.2\",\"matchCriteriaId\":\"7162DB91-6B5C-4575-A8D0-B83B34908BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\",\"versionEndExcluding\":\"23.q4\",\"matchCriteriaId\":\"2841E9B4-728C-4201-AAF1-3250A1DC08F3\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.