cve-2023-20598
Vulnerability from cvelistv5
Published
2023-10-17 13:26
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | Radeon™ RX 5000 Series Graphics Cards |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "radeon_rx_5300_xt", "vendor": "amd", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_5_7645hx", "vendor": "amd", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_9_pro_7945", "vendor": "amd", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20598", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-27T17:12:05.139002Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-27T17:12:23.788Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.253Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 RX 5000 Series Graphics Cards", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 RX 6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 RX 7000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 PRO W5000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 PRO W6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Radeon\u2122 PRO W7000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Ryzen\u2122 7045 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": " Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Ryzen\u2122 7040 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Ryzen\u2122 7000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "Windows", "x86" ], "product": "Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-10-16T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\n\n\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eAn improper privilege management in the AMD Radeon\u2122\u003c/span\u003e\u0026nbsp;\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eGraphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\u003c/span\u003e\n\n\n\n" } ], "value": "\n\n\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-10-17T13:26:21.731Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009" } ], "source": { "advisory": "\u202f\u202fAMD-SB-6009", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20598", "datePublished": "2023-10-17T13:26:21.731Z", "dateReserved": "2022-10-27T18:53:39.763Z", "dateUpdated": "2024-08-02T09:05:36.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\", \"versionEndExcluding\": \"23.9.2\", \"matchCriteriaId\": \"7162DB91-6B5C-4575-A8D0-B83B34908BE5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9995FBE-D440-45BA-86B5-1CFADF5BEE2B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6289D311-1997-47E7-B8D9-75C27CD0B9D1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02AA337B-595F-4859-A82A-DEC7BB346773\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F08BE928-65AA-4E21-A8F0-D013C8FFB693\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1952152-A184-4FC9-B1CC-008B8238B5ED\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D51EA58C-3684-4567-A213-9351F2E521B9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0026781-F1DA-4533-870E-BCA14CFC7005\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BB84A38-F651-44CB-93EF-502F1A197FBA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CEDC946-3685-4533-8D97-BDBDFB7AACBA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C66880A-FB33-477D-93FD-C280A4547D66\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CD3F898-5AB1-4E60-A086-ADCF33820154\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"863770A0-3A7F-43E3-98E5-77E42827FA6B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4FED1D5-F31A-44C9-9101-D70486CC6FC7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB12B48-ABF8-4FFB-BD4E-6413C34D477B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2D1C027-56B1-4EA7-842B-09B300B17808\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C24DE61-4036-42BF-A08F-67C234706703\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03D9040F-1D1D-49E5-A60E-4393F5D76B60\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A76A792F-7026-4F29-9A00-3A2EAB2DE5FC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33DAF63F-C468-438C-97C3-B6CE8BD12858\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A82D4745-ACAB-4FC2-A63D-3B0FEA208BED\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD80D674-1DD4-44E0-8C38-8341A7F392B1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10DD7029-9299-4901-A3D1-84D6102471B9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F73C59A-CDE2-4203-921F-1831D4ACFD2A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C980129B-D717-47F7-A6C1-5EB64FB1BF9A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B76C585C-FCC8-456D-A63C-7A769AF5EB07\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BB37AAC-3957-4840-B47E-ED678F0B6044\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA1DA067-DE94-4663-91CD-A70CC386D45A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9466279D-0582-464E-AFCC-20872CC99B56\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12EF0B24-689D-4BE8-98D5-D88A84D5E473\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F14D5A16-F7BE-427A-98AB-2E120DB756DC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC4A007-BEFD-4BF0-A176-7ECD6150041C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"838BCF03-8959-4B8F-96B2-416B880F33DE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33D5FFA6-9D23-4C95-B23D-F50EB60369CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"730BD289-75E3-4365-A0C1-D0AD1498F3C2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92A2E6B9-ADFB-4790-917B-9679CFE280E3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"334FD5E4-BA45-42BA-B1EC-0DC1E1F44018\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F6B0E69-D944-48CF-A3F3-EA350C1451AF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EDBF76B-3C2E-4421-800B-54CE6A997439\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72B69860-0C6F-40AD-8696-6150365D908F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BFE5253-2401-4EE4-90E7-9459F2A93CF1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\", \"versionEndExcluding\": \"23.q4\", \"matchCriteriaId\": \"2841E9B4-728C-4201-AAF1-3250A1DC08F3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E39052CC-CC5F-4782-9CCE-2F5C8342AD79\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85E68F7E-0A57-498A-9DB9-3D36045D671E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DB91262-2EF4-4F0D-8B61-0012BD25E7A8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3083C065-5A2C-4B2D-9C1F-5793BA3C0A52\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7557738A-5D93-4117-8FF2-9A27CD0E6BC5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ED51D4C-2C19-4C3B-814C-3F88AF25870C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98B858C0-0490-4D50-BC1E-FFB5A54E5DBC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFF5CD86-64D3-4F02-9971-AC50E8052986\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\", \"versionEndExcluding\": \"23.9.2\", \"matchCriteriaId\": \"7162DB91-6B5C-4575-A8D0-B83B34908BE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\", \"versionEndExcluding\": \"23.q4\", \"matchCriteriaId\": \"2841E9B4-728C-4201-AAF1-3250A1DC08F3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48F04B9F-8C65-476B-B5D8-18CC96E3B712\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"495E436C-B0EE-4B72-AB49-332F4752C140\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C4FDE72-050C-4A72-A4F4-9C1D5273CADD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D260012-5D8F-4B36-8B88-82DB0291EE9D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"025E494E-953E-426E-BE89-6F2360A3AAC4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1232B034-1214-4F9A-823D-DC76D5C5956B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0870FBE4-92B4-4717-88B0-EC1094268034\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE36D471-57BF-4385-A825-029F7313E4DB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"082BE536-F29C-4A73-B030-A19DD3A448B3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6740A06F-4512-427D-9CB9-A4A6DB046BA3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C05D51F-469D-487D-9FC8-E1AD699A6F74\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BC5E111-A7AA-4A45-A2E3-47013F9135D4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB5D5B25-F32A-493E-BD54-57098981E15A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E3657C6-1047-4CA9-8D44-C7143F7D877D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2787C72-42D5-42B0-BE5B-E548B319BCF4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09B085FF-EAEA-42BC-BA60-3AA9B76141B9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"760F20CC-9034-462C-A25E-C009E2218C38\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D2CBCEA-AB4F-444C-9CCD-A976003F796C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76121981-8DC2-4779-833E-4B15CFCF7FC3\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"225E8405-04FF-4885-92C8-8581ACC66E06\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D50E8EA-ECB2-463D-BA51-D13CF5A02266\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69289284-2ED2-4D8B-8AE2-B835AAF31EAD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA6CD984-A8C7-4B23-8FF9-896C503EBA37\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2D0429F-F186-4F78-9AE0-574E3A39926D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00DEBFA8-6007-4EAE-AD11-6D477ADE4E63\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8480A7E0-882C-4B03-ADBC-697304B0B7C5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA29FE4D-C9A2-46FB-8EC5-3067F56ED080\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B21FB338-F944-40F9-8F0C-99B471AAD51E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3674D656-9623-4B39-AADE-158FE70FF29F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD27234D-ACFC-4144-8980-2B706822C579\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5602B902-9FDB-4946-BE4C-236262285F2F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA666DF3-C5F3-4127-A8EE-B784DD41F642\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86CAA682-9666-4929-B1AC-D9DB3109DB1A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A7E6806-A7AC-4C96-960B-B8934CEA2439\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74DD4A40-B712-4B54-9CC7-0BFD79E917BA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82CCEE11-392D-4486-A6AD-CB64FB8B7081\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD6C7D37-C94B-4301-8C0A-5A00B3569D6E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F05C8669-6348-4A1B-B1D4-D22022E1F67E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"018A02C9-2A5C-43E2-8CCD-4D03C119C22B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3DE32CA-168F-4812-AEAE-D771EB01E15D\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"\\n\\n\\nAn improper privilege management in the AMD Radeon\\u2122\\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\\n\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Una gesti\\u00f3n de privilegios inadecuada en el controlador de gr\\u00e1ficos AMD Radeon\\u2122 puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones f\\u00edsicas arbitrarias, lo que resulta en una posible ejecuci\\u00f3n de c\\u00f3digo arbitrario.\"}]", "id": "CVE-2023-20598", "lastModified": "2024-11-21T07:41:12.177", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}", "published": "2023-10-17T14:15:09.813", "references": "[{\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\", \"source\": \"psirt@amd.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-269\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2023-20598\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2023-10-17T14:15:09.813\",\"lastModified\":\"2024-11-21T07:41:12.177\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\n\\n\\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\\n\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Una gesti\u00f3n de privilegios inadecuada en el controlador de gr\u00e1ficos AMD Radeon\u2122 puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones f\u00edsicas arbitrarias, lo que resulta en una posible ejecuci\u00f3n de c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\",\"versionEndExcluding\":\"23.9.2\",\"matchCriteriaId\":\"7162DB91-6B5C-4575-A8D0-B83B34908BE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9995FBE-D440-45BA-86B5-1CFADF5BEE2B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6289D311-1997-47E7-B8D9-75C27CD0B9D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02AA337B-595F-4859-A82A-DEC7BB346773\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F08BE928-65AA-4E21-A8F0-D013C8FFB693\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1952152-A184-4FC9-B1CC-008B8238B5ED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D51EA58C-3684-4567-A213-9351F2E521B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0026781-F1DA-4533-870E-BCA14CFC7005\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB84A38-F651-44CB-93EF-502F1A197FBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEDC946-3685-4533-8D97-BDBDFB7AACBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C66880A-FB33-477D-93FD-C280A4547D66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD3F898-5AB1-4E60-A086-ADCF33820154\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863770A0-3A7F-43E3-98E5-77E42827FA6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FED1D5-F31A-44C9-9101-D70486CC6FC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB12B48-ABF8-4FFB-BD4E-6413C34D477B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2D1C027-56B1-4EA7-842B-09B300B17808\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C24DE61-4036-42BF-A08F-67C234706703\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D9040F-1D1D-49E5-A60E-4393F5D76B60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A76A792F-7026-4F29-9A00-3A2EAB2DE5FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33DAF63F-C468-438C-97C3-B6CE8BD12858\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82D4745-ACAB-4FC2-A63D-3B0FEA208BED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD80D674-1DD4-44E0-8C38-8341A7F392B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10DD7029-9299-4901-A3D1-84D6102471B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F73C59A-CDE2-4203-921F-1831D4ACFD2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C980129B-D717-47F7-A6C1-5EB64FB1BF9A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76C585C-FCC8-456D-A63C-7A769AF5EB07\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB37AAC-3957-4840-B47E-ED678F0B6044\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA1DA067-DE94-4663-91CD-A70CC386D45A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9466279D-0582-464E-AFCC-20872CC99B56\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12EF0B24-689D-4BE8-98D5-D88A84D5E473\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14D5A16-F7BE-427A-98AB-2E120DB756DC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC4A007-BEFD-4BF0-A176-7ECD6150041C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"838BCF03-8959-4B8F-96B2-416B880F33DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33D5FFA6-9D23-4C95-B23D-F50EB60369CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"730BD289-75E3-4365-A0C1-D0AD1498F3C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A2E6B9-ADFB-4790-917B-9679CFE280E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"334FD5E4-BA45-42BA-B1EC-0DC1E1F44018\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6B0E69-D944-48CF-A3F3-EA350C1451AF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EDBF76B-3C2E-4421-800B-54CE6A997439\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72B69860-0C6F-40AD-8696-6150365D908F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFE5253-2401-4EE4-90E7-9459F2A93CF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\",\"versionEndExcluding\":\"23.q4\",\"matchCriteriaId\":\"2841E9B4-728C-4201-AAF1-3250A1DC08F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39052CC-CC5F-4782-9CCE-2F5C8342AD79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85E68F7E-0A57-498A-9DB9-3D36045D671E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB91262-2EF4-4F0D-8B61-0012BD25E7A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3083C065-5A2C-4B2D-9C1F-5793BA3C0A52\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7557738A-5D93-4117-8FF2-9A27CD0E6BC5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ED51D4C-2C19-4C3B-814C-3F88AF25870C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98B858C0-0490-4D50-BC1E-FFB5A54E5DBC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF5CD86-64D3-4F02-9971-AC50E8052986\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\",\"versionEndExcluding\":\"23.9.2\",\"matchCriteriaId\":\"7162DB91-6B5C-4575-A8D0-B83B34908BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\",\"versionEndExcluding\":\"23.q4\",\"matchCriteriaId\":\"2841E9B4-728C-4201-AAF1-3250A1DC08F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F04B9F-8C65-476B-B5D8-18CC96E3B712\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"495E436C-B0EE-4B72-AB49-332F4752C140\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C4FDE72-050C-4A72-A4F4-9C1D5273CADD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D260012-5D8F-4B36-8B88-82DB0291EE9D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"025E494E-953E-426E-BE89-6F2360A3AAC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1232B034-1214-4F9A-823D-DC76D5C5956B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0870FBE4-92B4-4717-88B0-EC1094268034\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE36D471-57BF-4385-A825-029F7313E4DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"082BE536-F29C-4A73-B030-A19DD3A448B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6740A06F-4512-427D-9CB9-A4A6DB046BA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C05D51F-469D-487D-9FC8-E1AD699A6F74\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC5E111-A7AA-4A45-A2E3-47013F9135D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5D5B25-F32A-493E-BD54-57098981E15A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3657C6-1047-4CA9-8D44-C7143F7D877D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2787C72-42D5-42B0-BE5B-E548B319BCF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09B085FF-EAEA-42BC-BA60-3AA9B76141B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760F20CC-9034-462C-A25E-C009E2218C38\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D2CBCEA-AB4F-444C-9CCD-A976003F796C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76121981-8DC2-4779-833E-4B15CFCF7FC3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225E8405-04FF-4885-92C8-8581ACC66E06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D50E8EA-ECB2-463D-BA51-D13CF5A02266\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69289284-2ED2-4D8B-8AE2-B835AAF31EAD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA6CD984-A8C7-4B23-8FF9-896C503EBA37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D0429F-F186-4F78-9AE0-574E3A39926D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00DEBFA8-6007-4EAE-AD11-6D477ADE4E63\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8480A7E0-882C-4B03-ADBC-697304B0B7C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA29FE4D-C9A2-46FB-8EC5-3067F56ED080\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B21FB338-F944-40F9-8F0C-99B471AAD51E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3674D656-9623-4B39-AADE-158FE70FF29F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD27234D-ACFC-4144-8980-2B706822C579\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5602B902-9FDB-4946-BE4C-236262285F2F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA666DF3-C5F3-4127-A8EE-B784DD41F642\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86CAA682-9666-4929-B1AC-D9DB3109DB1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A7E6806-A7AC-4C96-960B-B8934CEA2439\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74DD4A40-B712-4B54-9CC7-0BFD79E917BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82CCEE11-392D-4486-A6AD-CB64FB8B7081\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6C7D37-C94B-4301-8C0A-5A00B3569D6E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F05C8669-6348-4A1B-B1D4-D22022E1F67E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"018A02C9-2A5C-43E2-8CCD-4D03C119C22B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3DE32CA-168F-4812-AEAE-D771EB01E15D\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T09:05:36.253Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-20598\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-27T17:12:05.139002Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"radeon_rx_5300_xt\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_5_7645hx\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_9_pro_7945\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269 Improper Privilege Management\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-27T14:50:58.617Z\"}}], \"cna\": {\"source\": {\"advisory\": \"\\u202f\\u202fAMD-SB-6009\", \"discovery\": \"EXTERNAL\"}, \"affected\": [{\"vendor\": \" AMD\", \"product\": \"Radeon\\u2122 RX 5000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"various\"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Radeon\\u2122 RX 6000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Radeon\\u2122 RX 7000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Radeon\\u2122 PRO W5000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"Various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Radeon\\u2122 PRO W6000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Radeon\\u2122 PRO W7000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"various\"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 7045 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \" Ryzen\\u2122 7020 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 7040 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 7000 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 6000 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 7035 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2023-10-16T17:00:00.000Z\", \"references\": [{\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\n\\n\\nAn improper privilege management in the AMD Radeon\\u2122\\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\\n\\n\u003cspan style=\\\"background-color: rgb(248, 249, 250);\\\"\u003eAn improper privilege management in the AMD Radeon\\u2122\u003c/span\u003e\u0026nbsp;\u003cspan style=\\\"background-color: rgb(248, 249, 250);\\\"\u003eGraphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\u003c/span\u003e\\n\\n\\n\\n\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"shortName\": \"AMD\", \"dateUpdated\": \"2023-10-17T13:26:21.731Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-20598\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T09:05:36.253Z\", \"dateReserved\": \"2022-10-27T18:53:39.763Z\", \"assignerOrgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"datePublished\": \"2023-10-17T13:26:21.731Z\", \"assignerShortName\": \"AMD\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.