Vulnerabilites related to amd - radeon_rx_6500m
CVE-2021-26391 (GCVE-0-2021-26391)
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2025-05-01 14:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- TBD
Summary
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| ▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:26:25.325Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2021-26391",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-01T14:19:01.036693Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "CWE-347 Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-01T14:19:25.590Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series",
"vendor": "AMD",
"versions": [
{
"lessThan": "22.5.2",
"status": "affected",
"version": "AMD Radeon Software",
"versionType": "custom"
},
{
"lessThan": "22.Q2",
"status": "affected",
"version": "AMD Radeon Pro Software Enterprise",
"versionType": "custom"
},
{
"lessThan": "22.10.20",
"status": "affected",
"version": "Enterprise Driver",
"versionType": "custom"
}
]
},
{
"product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series",
"vendor": "AMD",
"versions": [
{
"lessThan": "22.5.2",
"status": "affected",
"version": "AMD Radeon Software",
"versionType": "custom"
},
{
"lessThan": "22.Q2",
"status": "affected",
"version": "AMD Radeon Pro Software Enterprise",
"versionType": "custom"
},
{
"lessThan": "22.10.20",
"status": "affected",
"version": "Enterprise Driver",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-11-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "TBD",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-11-09T00:00:00.000Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
}
],
"source": {
"advisory": "AMD-SB-1029",
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2021-26391",
"datePublished": "2022-11-09T20:44:25.253Z",
"dateReserved": "2021-01-29T00:00:00.000Z",
"dateUpdated": "2025-05-01T14:19:25.590Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20510 (GCVE-0-2023-20510)
Vulnerability from cvelistv5
Published
2024-08-13 16:52
Modified
2024-11-21 15:32
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| ▼ | AMD | AMD Radeon™ RX 6000 Series Graphics Cards | |||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-20510",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-13T18:03:49.594825Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T15:32:34.695Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "AMD Software: PRO Edition 23.Q4 (23.30.13.03)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service."
}
],
"value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-13T16:52:11.777Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2023-20510",
"datePublished": "2024-08-13T16:52:11.777Z",
"dateReserved": "2022-10-27T18:53:39.735Z",
"dateUpdated": "2024-11-21T15:32:34.695Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-26360 (GCVE-0-2021-26360)
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2025-05-01 14:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- TBD
Summary
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| AMD | AMD Radeon RX 6000 Series & PRO W6000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:26:25.015Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2021-26360",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-01T14:11:37.852727Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-01T14:12:12.910Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series",
"vendor": "AMD",
"versions": [
{
"lessThan": "22.5.2",
"status": "affected",
"version": "AMD Radeon Software",
"versionType": "custom"
},
{
"lessThan": "22.Q2",
"status": "affected",
"version": "AMD Radeon Pro Software Enterprise",
"versionType": "custom"
},
{
"lessThan": "22.10.20",
"status": "affected",
"version": "Enterprise Driver",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-11-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor\u2019s encrypted memory contents which may lead to arbitrary code execution in ASP."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "TBD",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-11-09T00:00:00.000Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
}
],
"source": {
"advisory": "AMD-SB-1029",
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2021-26360",
"datePublished": "2022-11-09T20:44:26.034Z",
"dateReserved": "2021-01-29T00:00:00.000Z",
"dateUpdated": "2025-05-01T14:12:12.910Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-26367 (GCVE-0-2021-26367)
Vulnerability from cvelistv5
Published
2024-08-13 16:50
Modified
2024-12-04 16:25
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-26367",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-13T18:04:31.680686Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T16:25:09.987Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "ComboAM4v2 PI 1.2.0.5"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "ComboAM4PI 1.0.0.9"
},
{
"status": "unaffected",
"version": "ComboAM4v2 PI 1.2.0.8"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "ComboAM4v2 PI 1.2.0.5"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "PicassoPI-FP5 1.0.0.E"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "PollockPI-FT5 1.0.0.4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "PicassoPI-FP5 1.0.0.E"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "RenoirPI-FP6 1.0.0.7"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "CezannePI-FP6 1.0.0.6"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "CezannePI-FP6 1.0.0.6"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "CezannePI-FP6 1.0.0.6"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "CezannePI-FP6 1.0.0.6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "CezannePI-FP6 1.0.0.6"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "AMD Software: PRO Edition 23.Q4 (23.30.13.03)"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 Embedded R1000 Series Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "EmbeddedPI-FP5 1.2.0.A"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 Embedded R2000 Series Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "EmbeddedR2KPI-FP5 1.0.0.2"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 Embedded V1000 Series Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "EmbeddedPI-FP5 1.2.0.A"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 Embedded V2000 Series Processors",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "EmbeddedPI-FP6 1.0.0.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
}
],
"value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-13T16:50:05.825Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
},
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2021-26367",
"datePublished": "2024-08-13T16:50:05.825Z",
"dateReserved": "2021-01-29T21:24:26.151Z",
"dateUpdated": "2024-12-04T16:25:09.987Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20598 (GCVE-0-2023-20598)
Vulnerability from cvelistv5
Published
2023-10-17 13:26
Modified
2024-08-02 09:05
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
References
| ▼ | URL | Tags |
|---|---|---|
| https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009 | vendor-advisory |
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ▼ | AMD | Radeon™ RX 5000 Series Graphics Cards |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "radeon_rx_5300_xt",
"vendor": "amd",
"versions": [
{
"lessThanOrEqual": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ryzen_5_7645hx",
"vendor": "amd",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ryzen_9_pro_7945",
"vendor": "amd",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-20598",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-27T17:12:05.139002Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-27T17:12:23.788Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:05:36.253Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Radeon\u2122 RX 5000 Series Graphics Cards",
"vendor": " AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Radeon\u2122 RX 6000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Radeon\u2122 RX 7000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Radeon\u2122 PRO W5000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "Various "
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Radeon\u2122 PRO W6000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Radeon\u2122 PRO W7000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Ryzen\u2122 7045 Series Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": " Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Ryzen\u2122 7040 Series Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Ryzen\u2122 7000 Series Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "affected",
"platforms": [
"Windows",
"x86"
],
"product": "Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
}
],
"datePublic": "2023-10-16T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\n\n\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eAn improper privilege management in the AMD Radeon\u2122\u003c/span\u003e\u0026nbsp;\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eGraphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\u003c/span\u003e\n\n\n\n"
}
],
"value": "\n\n\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n"
}
],
"providerMetadata": {
"dateUpdated": "2023-10-17T13:26:21.731Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009"
}
],
"source": {
"advisory": "\u202f\u202fAMD-SB-6009",
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2023-20598",
"datePublished": "2023-10-17T13:26:21.731Z",
"dateReserved": "2022-10-27T18:53:39.763Z",
"dateUpdated": "2024-08-02T09:05:36.253Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20568 (GCVE-0-2023-20568)
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2025-02-13 16:39
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:05:36.255Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "AMD Software: Adrenalin Edition 23.7.1",
"platforms": [
"x86"
],
"product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "AMD Software: PRO Edition 23.Q3",
"platforms": [
"x86"
],
"product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"x86"
],
"product": "Radeon\u2122 RX Vega Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"x86"
],
"product": "Radeon\u2122 PRO WX Vega Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
}
],
"datePublic": "2023-11-14T17:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
}
],
"value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution."
}
],
"providerMetadata": {
"dateUpdated": "2023-11-14T18:55:23.226Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
}
],
"source": {
"advisory": "AMD-SB-6003",
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2023-20568",
"datePublished": "2023-11-14T18:51:35.466Z",
"dateReserved": "2022-10-27T18:53:39.754Z",
"dateUpdated": "2025-02-13T16:39:47.747Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-31307 (GCVE-0-2023-31307)
Vulnerability from cvelistv5
Published
2024-08-13 16:54
Modified
2024-12-03 16:30
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| ▼ | AMD | AMD Radeon™ RX 6000 Series Graphics Cards | |||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-31307",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-13T18:03:11.598841Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-129",
"description": "CWE-129 Improper Validation of Array Index",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-03T16:30:08.173Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "AMD Software: PRO Edition 23.Q4 (23.30.13.03)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u0026nbsp; \u0026nbsp;Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service."
}
],
"value": "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-13T16:54:03.514Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2023-31307",
"datePublished": "2024-08-13T16:54:03.514Z",
"dateReserved": "2023-04-27T15:25:41.422Z",
"dateUpdated": "2024-12-03T16:30:08.173Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-20567 (GCVE-0-2023-20567)
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2025-02-13 16:39
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:05:36.949Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "AMD Software: Adrenalin Edition 23.7.1",
"platforms": [
"x86"
],
"product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "AMD Software: PRO Edition 23.Q3",
"platforms": [
"x86"
],
"product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"x86"
],
"product": "Radeon\u2122 RX Vega Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"x86"
],
"product": "Radeon\u2122 PRO WX Vega Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
}
],
"datePublic": "2023-11-14T17:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
}
],
"value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution."
}
],
"providerMetadata": {
"dateUpdated": "2023-11-14T18:55:22.270Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
}
],
"source": {
"advisory": "AMD-SB-6003",
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2023-20567",
"datePublished": "2023-11-14T18:51:25.340Z",
"dateReserved": "2022-10-27T18:53:39.753Z",
"dateUpdated": "2025-02-13T16:39:47.219Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-31320 (GCVE-0-2023-31320)
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 14:53
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.
References
| ▼ | URL | Tags |
|---|---|---|
| https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | vendor-advisory |
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T14:53:30.757Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "AMD Software: Adrenalin Edition 23.7.1 ",
"platforms": [
"x86"
],
"product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards ",
"vendor": " AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "AMD Software: PRO Edition 23.Q3 ",
"platforms": [
"x86"
],
"product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards",
"vendor": " AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"x86"
],
"product": "Radeon\u2122 RX Vega Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"x86"
],
"product": "Radeon\u2122 PRO WX Vega Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
}
],
"datePublic": "2023-11-14T17:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
}
],
"value": "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n"
}
],
"providerMetadata": {
"dateUpdated": "2023-11-14T18:51:43.415Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
}
],
"source": {
"advisory": "AMD-SB-6003",
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2023-31320",
"datePublished": "2023-11-14T18:51:43.415Z",
"dateReserved": "2023-04-27T15:25:41.423Z",
"dateUpdated": "2024-08-02T14:53:30.757Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-26392 (GCVE-0-2021-26392)
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 20:51
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:26:25.366Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series",
"vendor": "AMD",
"versions": [
{
"lessThan": "22.5.2",
"status": "affected",
"version": "AMD Radeon Software",
"versionType": "custom"
},
{
"lessThan": "22.Q2",
"status": "affected",
"version": "AMD Radeon Pro Software Enterprise",
"versionType": "custom"
},
{
"lessThan": "22.10.20",
"status": "affected",
"version": "Enterprise Driver",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series",
"vendor": "AMD",
"versions": [
{
"lessThan": "22.5.2",
"status": "affected",
"version": "AMD Radeon Software",
"versionType": "custom"
},
{
"lessThan": "22.Q2",
"status": "affected",
"version": "AMD Radeon Pro Software Enterprise",
"versionType": "custom"
},
{
"lessThan": "22.10.20",
"status": "affected",
"version": "Enterprise Driver",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 Embedded R1000",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 Embedded R2000",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 Embedded 5000",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 Embedded V1000",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 Embedded V2000",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122Embedded V3000",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
}
],
"datePublic": "2022-11-08T05:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eInsufficient verification of missing size check in \u0027LoadModule\u0027 may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.\u003c/p\u003e"
}
],
"value": "Insufficient verification of missing size check in \u0027LoadModule\u0027 may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA."
}
],
"providerMetadata": {
"dateUpdated": "2024-02-13T19:22:08.137Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
},
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
}
],
"source": {
"advisory": "AMD-SB-1029, AMD-SB-5001",
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2021-26392",
"datePublished": "2022-11-09T20:44:26.258839Z",
"dateReserved": "2021-01-29T00:00:00",
"dateUpdated": "2024-09-16T20:51:46.791Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-46748 (GCVE-0-2021-46748)
Vulnerability from cvelistv5
Published
2023-11-14 18:50
Modified
2025-02-13 16:28
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ▼ | AMD | Radeon™ RX 5000/6000/7000 Series Graphics Cards |
Version: various |
||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T05:17:42.605Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "AMD Software: Adrenalin Edition 23.7.1",
"platforms": [
"x86"
],
"product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "AMD Software: PRO Edition 23.Q3",
"platforms": [
"x86"
],
"product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"x86"
],
"product": "Radeon\u2122 RX Vega Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"x86"
],
"product": "Radeon\u2122 PRO WX Vega Series Graphics Cards",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
}
],
"datePublic": "2023-11-14T17:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
}
],
"value": "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service."
}
],
"providerMetadata": {
"dateUpdated": "2023-11-14T18:55:08.336Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
}
],
"source": {
"advisory": "AMD-SB-6003",
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2021-46748",
"datePublished": "2023-11-14T18:50:52.470Z",
"dateReserved": "2022-03-31T16:50:27.865Z",
"dateUpdated": "2025-02-13T16:28:47.934Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-26393 (GCVE-0-2021-26393)
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 21:58
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ▼ | AMD | AMD Radeon RX 5000 Series & PRO W5000 Series |
Version: AMD Radeon Software < 22.5.2 Version: AMD Radeon Pro Software Enterprise < 22.Q2 Version: Enterprise Driver < 22.10.20 |
||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:26:25.406Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series",
"vendor": "AMD",
"versions": [
{
"lessThan": "22.5.2",
"status": "affected",
"version": "AMD Radeon Software",
"versionType": "custom"
},
{
"lessThan": "22.Q2",
"status": "affected",
"version": "AMD Radeon Pro Software Enterprise",
"versionType": "custom"
},
{
"lessThan": "22.10.20",
"status": "affected",
"version": "Enterprise Driver",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series",
"vendor": "AMD",
"versions": [
{
"lessThan": "22.5.2",
"status": "affected",
"version": "AMD Radeon Software",
"versionType": "custom"
},
{
"lessThan": "22.Q2",
"status": "affected",
"version": "AMD Radeon Pro Software Enterprise",
"versionType": "custom"
},
{
"lessThan": "22.10.20",
"status": "affected",
"version": "Enterprise Driver",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 Embedded R1000",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 Embedded R2000",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 Embedded V1000",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AMD Ryzen\u2122 Embedded V2000",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
}
],
"datePublic": "2022-11-08T05:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eInsufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.\u003c/p\u003e"
}
],
"value": "Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality."
}
],
"providerMetadata": {
"dateUpdated": "2024-02-13T19:22:50.269Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
},
{
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
}
],
"source": {
"advisory": "AMD-SB-1029, AMD-SB-5001",
"discovery": "EXTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2021-26393",
"datePublished": "2022-11-09T20:44:25.517806Z",
"dateReserved": "2021-01-29T00:00:00",
"dateUpdated": "2024-09-16T21:58:26.137Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2025-02-13 17:15
Severity ?
Summary
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
References
| ▼ | URL | Tags | |
|---|---|---|---|
| psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
| psirt@amd.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| intel | radeon_rx_vega_m_firmware | * | |
| intel | core_i5-8305g | - | |
| intel | core_i7-8705g | - | |
| intel | core_i7-8706g | - | |
| intel | core_i7-8709g | - | |
| intel | nuc_8_enthusiast_nuc8i7hnkqc | - | |
| intel | nuc_8_enthusiast_nuc8i7hvkva | - | |
| intel | nuc_8_enthusiast_nuc8i7hvkvaw | - | |
| intel | nuc_kit_nuc8i7hnk | - | |
| intel | nuc_kit_nuc8i7hvk | - | |
| amd | radeon_software | * | |
| amd | radeon_rx_5300 | - | |
| amd | radeon_rx_5300_xt | - | |
| amd | radeon_rx_5300m | - | |
| amd | radeon_rx_5500 | - | |
| amd | radeon_rx_5500_xt | - | |
| amd | radeon_rx_5500m | - | |
| amd | radeon_rx_5600 | - | |
| amd | radeon_rx_5600_xt | - | |
| amd | radeon_rx_5600m | - | |
| amd | radeon_rx_5700 | - | |
| amd | radeon_rx_5700_xt | - | |
| amd | radeon_rx_5700m | - | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6450m | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6550m | - | |
| amd | radeon_rx_6550s | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_rx_7600 | - | |
| amd | radeon_rx_7600m | - | |
| amd | radeon_rx_7600m_xt | - | |
| amd | radeon_rx_7600s | - | |
| amd | radeon_rx_7700_xt | - | |
| amd | radeon_rx_7700s | - | |
| amd | radeon_rx_7800_xt | - | |
| amd | radeon_rx_7900_gre | - | |
| amd | radeon_rx_7900_xt | - | |
| amd | radeon_rx_7900_xtx | - | |
| amd | radeon_rx_7900m | - | |
| amd | radeon_software | * | |
| amd | radeon_pro_w5500 | - | |
| amd | radeon_pro_w5500x | - | |
| amd | radeon_pro_w5700 | - | |
| amd | radeon_pro_w5700x | - | |
| amd | radeon_pro_w6300 | - | |
| amd | radeon_pro_w6300m | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6500m | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6600m | - | |
| amd | radeon_pro_w6600x | - | |
| amd | radeon_pro_w6800 | - | |
| amd | radeon_pro_w6800x | - | |
| amd | radeon_pro_w6800x_duo | - | |
| amd | radeon_pro_w6900x | - | |
| amd | radeon_pro_w7500 | - | |
| amd | radeon_pro_w7600 | - | |
| amd | radeon_pro_w7800 | - | |
| amd | radeon_rx_vega_56_firmware | - | |
| amd | radeon_rx_vega_56 | - | |
| amd | radeon_rx_vega_64_firmware | - | |
| amd | radeon_rx_vega_64 | - | |
| amd | radeon_pro_vega_56_firmware | - | |
| amd | radeon_pro_vega_56 | - | |
| amd | radeon_pro_vega_64_firmware | - | |
| amd | radeon_pro_vega_64 | - | |
| amd | radeon_software | * | |
| amd | radeon_software | * | |
| amd | ryzen_3_3015ce | - | |
| amd | ryzen_3_3015e | - | |
| amd | ryzen_3_4100 | - | |
| amd | ryzen_3_4300g | - | |
| amd | ryzen_3_4300ge | - | |
| amd | ryzen_3_4300u | - | |
| amd | ryzen_3_5300g | - | |
| amd | ryzen_3_5300ge | - | |
| amd | ryzen_3_5300u | - | |
| amd | ryzen_5_4500 | - | |
| amd | ryzen_5_4500u | - | |
| amd | ryzen_5_4600g | - | |
| amd | ryzen_5_4600ge | - | |
| amd | ryzen_5_4600h | - | |
| amd | ryzen_5_4600hs | - | |
| amd | ryzen_5_4600u | - | |
| amd | ryzen_5_4680u | - | |
| amd | ryzen_5_5500h | - | |
| amd | ryzen_5_5500u | - | |
| amd | ryzen_5_5600g | - | |
| amd | ryzen_5_5600ge | - | |
| amd | ryzen_5_pro_3200g | - | |
| amd | ryzen_5_pro_3200ge | - | |
| amd | ryzen_5_pro_3350g | - | |
| amd | ryzen_5_pro_3350ge | - | |
| amd | ryzen_5_pro_3400g | - | |
| amd | ryzen_5_pro_3400ge | - | |
| amd | ryzen_7_4700g | - | |
| amd | ryzen_7_4700ge | - | |
| amd | ryzen_7_4700u | - | |
| amd | ryzen_7_4800h | - | |
| amd | ryzen_7_4800hs | - | |
| amd | ryzen_7_4980u | - | |
| amd | ryzen_7_5700g | - | |
| amd | ryzen_7_5700ge | - | |
| amd | ryzen_7_5700u | - | |
| amd | ryzen_9_4900h | - | |
| amd | ryzen_9_4900hs | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4",
"versionEndExcluding": "23.10.01.46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A4CCCB-01CC-4488-9336-C0C379ABE609",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
"versionEndExcluding": "23.7.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
"versionEndExcluding": "23.q3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
"versionEndExcluding": "23.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
"versionEndExcluding": "23.q3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service."
},
{
"lang": "es",
"value": "Una verificaci\u00f3n de l\u00edmites insuficiente en el ASP (AMD Secure Processor) puede permitir que un atacante acceda a la memoria fuera de los l\u00edmites de lo permitido para una TA (Trusted Application), lo que resulta en una posible denegaci\u00f3n de servicio."
}
],
"id": "CVE-2021-46748",
"lastModified": "2025-02-13T17:15:34.023",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-11-14T19:15:10.267",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
References
| ▼ | URL | Tags | |
|---|---|---|---|
| psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
| psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| amd | enterprise_driver | * | |
| amd | radeon_pro_software | * | |
| amd | radeon_software | * | |
| amd | radeon_pro_w5500 | - | |
| amd | radeon_pro_w5500x | - | |
| amd | radeon_pro_w5700 | - | |
| amd | radeon_pro_w5700x | - | |
| amd | radeon_pro_w6300m | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6500m | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6600m | - | |
| amd | radeon_pro_w6600x | - | |
| amd | radeon_pro_w6800 | - | |
| amd | radeon_pro_w6800x | - | |
| amd | radeon_pro_w6800x_duo | - | |
| amd | radeon_pro_w6900x | - | |
| amd | radeon_rx_5300 | - | |
| amd | radeon_rx_5300_xt | - | |
| amd | radeon_rx_5300m | - | |
| amd | radeon_rx_5500 | - | |
| amd | radeon_rx_5500_xt | - | |
| amd | radeon_rx_5500m | - | |
| amd | radeon_rx_5600 | - | |
| amd | radeon_rx_5600_xt | - | |
| amd | radeon_rx_5600m | - | |
| amd | radeon_rx_5700 | - | |
| amd | radeon_rx_5700_xt | - | |
| amd | radeon_rx_5700m | - | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6750_xt | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_rx_vega_56_firmware | - | |
| amd | radeon_rx_vega_56 | - | |
| amd | radeon_rx_vega_64_firmware | - | |
| amd | radeon_rx_vega_64 | - | |
| amd | ryzen_3_2200ge_firmware | - | |
| amd | ryzen_3_2200ge | - | |
| amd | ryzen_3_2200g_firmware | - | |
| amd | ryzen_3_2200g | - | |
| amd | ryzen_5_2400ge_firmware | - | |
| amd | ryzen_5_2400ge | - | |
| amd | ryzen_5_2400g_firmware | - | |
| amd | ryzen_5_2400g | - | |
| amd | ryzen_3_3100_firmware | - | |
| amd | ryzen_3_3100 | - | |
| amd | ryzen_3_3300x_firmware | - | |
| amd | ryzen_3_3300x | - | |
| amd | ryzen_5_3500_firmware | - | |
| amd | ryzen_5_3500 | - | |
| amd | ryzen_5_3500x_firmware | - | |
| amd | ryzen_5_3500x | - | |
| amd | ryzen_5_3600_firmware | - | |
| amd | ryzen_5_3600 | - | |
| amd | ryzen_5_3600x_firmware | - | |
| amd | ryzen_5_3600x | - | |
| amd | ryzen_5_3600xt_firmware | - | |
| amd | ryzen_5_3600xt | - | |
| amd | ryzen_7_3700x_firmware | - | |
| amd | ryzen_7_3700x | - | |
| amd | ryzen_7_3800x_firmware | - | |
| amd | ryzen_7_3800x | - | |
| amd | ryzen_7_3800xt_firmware | - | |
| amd | ryzen_7_3800xt | - | |
| amd | ryzen_9_3900_firmware | - | |
| amd | ryzen_9_3900 | - | |
| amd | ryzen_9_3900x_firmware | - | |
| amd | ryzen_9_3900x | - | |
| amd | ryzen_9_3900xt_firmware | - | |
| amd | ryzen_9_3900xt | - | |
| amd | ryzen_9_3950x_firmware | - | |
| amd | ryzen_9_3950x | - | |
| amd | ryzen_5_5500_firmware | - | |
| amd | ryzen_5_5500 | - | |
| amd | ryzen_5_5600_firmware | - | |
| amd | ryzen_5_5600 | - | |
| amd | ryzen_5_5600x_firmware | - | |
| amd | ryzen_5_5600x | - | |
| amd | ryzen_7_5700x_firmware | - | |
| amd | ryzen_7_5700x | - | |
| amd | ryzen_7_5800x_firmware | - | |
| amd | ryzen_7_5800x | - | |
| amd | ryzen_7_5800_firmware | - | |
| amd | ryzen_7_5800 | - | |
| amd | ryzen_7_5800x3d_firmware | - | |
| amd | ryzen_7_5800x3d | - | |
| amd | ryzen_9_5900_firmware | - | |
| amd | ryzen_9_5900 | - | |
| amd | ryzen_9_5900x_firmware | - | |
| amd | ryzen_9_5900x | - | |
| amd | ryzen_9_5950x_firmware | - | |
| amd | ryzen_9_5950x | - | |
| amd | ryzen_3_5300ge_firmware | - | |
| amd | ryzen_3_5300ge | - | |
| amd | ryzen_3_5300g_firmware | - | |
| amd | ryzen_3_5300g | - | |
| amd | ryzen_5_5600ge_firmware | - | |
| amd | ryzen_5_5600ge | - | |
| amd | ryzen_5_5600g_firmware | - | |
| amd | ryzen_5_5600g | - | |
| amd | ryzen_7_5700ge_firmware | - | |
| amd | ryzen_7_5700ge | - | |
| amd | ryzen_7_5700g_firmware | - | |
| amd | ryzen_7_5700g | - | |
| amd | ryzen_threadripper_3960x_firmware | - | |
| amd | ryzen_threadripper_3960x | - | |
| amd | ryzen_threadripper_3970x_firmware | - | |
| amd | ryzen_threadripper_3970x | - | |
| amd | ryzen_threadripper_3990x_firmware | - | |
| amd | ryzen_threadripper_3990x | - | |
| amd | ryzen_threadripper_pro_3945wx_firmware | - | |
| amd | ryzen_threadripper_pro_3945wx | - | |
| amd | ryzen_threadripper_pro_3955wx_firmware | - | |
| amd | ryzen_threadripper_pro_3955wx | - | |
| amd | ryzen_threadripper_pro_3975wx_firmware | - | |
| amd | ryzen_threadripper_pro_3975wx | - | |
| amd | ryzen_threadripper_pro_3995wx_firmware | - | |
| amd | ryzen_threadripper_pro_3995wx | - | |
| amd | ryzen_threadripper_pro_5945wx_firmware | - | |
| amd | ryzen_threadripper_pro_5945wx | - | |
| amd | ryzen_threadripper_pro_5955wx_firmware | - | |
| amd | ryzen_threadripper_pro_5955wx | - | |
| amd | ryzen_threadripper_pro_5965wx_firmware | - | |
| amd | ryzen_threadripper_pro_5965wx | - | |
| amd | ryzen_threadripper_pro_5975wx_firmware | - | |
| amd | ryzen_threadripper_pro_5975wx | - | |
| amd | ryzen_threadripper_pro_5995wx_firmware | - | |
| amd | ryzen_threadripper_pro_5995wx | - | |
| amd | athlon_silver_3050e_firmware | - | |
| amd | athlon_silver_3050e | - | |
| amd | athlon_pro_3045b_firmware | - | |
| amd | athlon_pro_3045b | - | |
| amd | athlon_silver_3050u_firmware | - | |
| amd | athlon_silver_3050u | - | |
| amd | athlon_silver_3050c_firmware | - | |
| amd | athlon_silver_3050c | - | |
| amd | athlon_pro_3145b_firmware | - | |
| amd | athlon_pro_3145b | - | |
| amd | athlon_gold_3150u_firmware | - | |
| amd | athlon_gold_3150u | - | |
| amd | athlon_gold_3150c_firmware | - | |
| amd | athlon_gold_3150c | - | |
| amd | ryzen_3_3250u_firmware | - | |
| amd | ryzen_3_3250u | - | |
| amd | ryzen_3_3250c_firmware | - | |
| amd | ryzen_3_3250c | - | |
| amd | amd_3020e_firmware | - | |
| amd | amd_3020e | - | |
| amd | amd_3015e_firmware | - | |
| amd | amd_3015e | - | |
| amd | amd_3015ce_firmware | - | |
| amd | amd_3015ce | - | |
| amd | ryzen_3_2200u_firmware | - | |
| amd | ryzen_3_2200u | - | |
| amd | ryzen_3_2300u_firmware | - | |
| amd | ryzen_3_2300u | - | |
| amd | ryzen_5_2500u_firmware | - | |
| amd | ryzen_5_2500u | - | |
| amd | ryzen_5_2600h_firmware | - | |
| amd | ryzen_5_2600h | - | |
| amd | ryzen_7_2700u_firmware | - | |
| amd | ryzen_7_2700u | - | |
| amd | ryzen_7_2800h_firmware | - | |
| amd | ryzen_7_2800h | - | |
| amd | ryzen_3_3300u_firmware | - | |
| amd | ryzen_3_3300u | - | |
| amd | ryzen_3_3350u_firmware | - | |
| amd | ryzen_3_3350u | - | |
| amd | ryzen_5_3450u_firmware | - | |
| amd | ryzen_5_3450u | - | |
| amd | ryzen_5_3500u_firmware | - | |
| amd | ryzen_5_3500u | - | |
| amd | ryzen_5_3500c_firmware | - | |
| amd | ryzen_5_3500c | - | |
| amd | ryzen_5_3550h_firmware | - | |
| amd | ryzen_5_3550h | - | |
| amd | ryzen_5_3580u_firmware | - | |
| amd | ryzen_5_3580u | - | |
| amd | ryzen_7_3700u_firmware | - | |
| amd | ryzen_7_3700u | - | |
| amd | ryzen_7_3700c_firmware | - | |
| amd | ryzen_7_3700c | - | |
| amd | ryzen_7_3750h_firmware | - | |
| amd | ryzen_7_3750h | - | |
| amd | ryzen_7_3780u_firmware | - | |
| amd | ryzen_7_3780u | - | |
| amd | ryzen_3_pro_3200ge_firmware | - | |
| amd | ryzen_3_pro_3200ge | - | |
| amd | ryzen_3_3200g_firmware | - | |
| amd | ryzen_3_3200g | - | |
| amd | ryzen_3_pro_3200g_firmware | - | |
| amd | ryzen_3_pro_3200g | - | |
| amd | ryzen_5_pro_3350ge_firmware | - | |
| amd | ryzen_5_pro_3350ge | - | |
| amd | ryzen_5_pro_3350g_firmware | - | |
| amd | ryzen_5_pro_3350g | - | |
| amd | ryzen_5_pro_3400ge_firmware | - | |
| amd | ryzen_5_pro_3400ge | - | |
| amd | ryzen_5_pro_3400g_firmware | - | |
| amd | ryzen_5_pro_3400g | - | |
| amd | ryzen_5_3400g_firmware | - | |
| amd | ryzen_5_3400g | - | |
| amd | ryzen_3_5300u_firmware | - | |
| amd | ryzen_3_5300u | - | |
| amd | ryzen_5_5500u_firmware | - | |
| amd | ryzen_5_5500u | - | |
| amd | ryzen_7_5700u_firmware | - | |
| amd | ryzen_7_5700u | - | |
| amd | ryzen_3_5400u_firmware | - | |
| amd | ryzen_3_5400u | - | |
| amd | ryzen_5_5560u_firmware | - | |
| amd | ryzen_5_5560u | - | |
| amd | ryzen_5_5600u_firmware | - | |
| amd | ryzen_5_5600u | - | |
| amd | ryzen_5_5600h_firmware | - | |
| amd | ryzen_5_5600h | - | |
| amd | ryzen_5_5600hs_firmware | - | |
| amd | ryzen_5_5600hs | - | |
| amd | ryzen_7_5800u_firmware | - | |
| amd | ryzen_7_5800u | - | |
| amd | ryzen_7_5800h_firmware | - | |
| amd | ryzen_7_5800h | - | |
| amd | ryzen_7_5800hs_firmware | - | |
| amd | ryzen_7_5800hs | - | |
| amd | ryzen_9_5900hs_firmware | - | |
| amd | ryzen_9_5900hs | - | |
| amd | ryzen_9_5900hx_firmware | - | |
| amd | ryzen_9_5900hx | - | |
| amd | ryzen_9_5980hs_firmware | - | |
| amd | ryzen_9_5980hs | - | |
| amd | ryzen_9_5980hx_firmware | - | |
| amd | ryzen_9_5980hx | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
"versionEndExcluding": "22.10.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
"versionEndExcluding": "22.q2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
"versionEndExcluding": "22.5.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4350ADE3-9A31-4A23-9B15-7A44E8F29E90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "777D94BA-613B-49E9-B1B3-2A9E0FC35908",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6882B4E1-0BFF-4093-BE67-72294949C3F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E741A31-8265-45E0-9834-23D00D5F8176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "913A2DC9-4215-486B-BD15-3AF515E3CDCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DF8A936-58AE-44BB-897E-44782232394F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9FC3889-3F62-48AC-876D-5A630A5E2AD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D79E460A-D34C-4120-8529-F32988793DC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "069392FC-51DB-49F0-B30B-8ED46C694057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51D4403E-C626-4817-B0C9-ECEC420C517D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58EE3F9B-6950-4F83-B0BE-ADA560457BC1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "945182A3-1BE3-459D-BC45-5554FB905C3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient verification of missing size check in \u0027LoadModule\u0027 may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA."
},
{
"lang": "es",
"value": "Una verificaci\u00f3n insuficiente del tama\u00f1o faltante en \u0027LoadModule\u0027 puede provocar una escritura fuera de l\u00edmites que podr\u00eda permitir que un atacante con privilegios obtenga la ejecuci\u00f3n de c\u00f3digo del sistema operativo/kernel cargando un TA malicioso."
}
],
"id": "CVE-2021-26392",
"lastModified": "2024-11-21T05:56:16.773",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-11-09T21:15:12.360",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
},
{
"source": "psirt@amd.com",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:41
Severity ?
5.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| amd | radeon_software | * | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6450m | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6550m | - | |
| amd | radeon_rx_6550s | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6750_gre | - | |
| amd | radeon_rx_6750_xt | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_software | * | |
| amd | radeon_pro_w6300 | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6800 | - | |
| amd | ryzen_9_5980hx_firmware | * | |
| amd | ryzen_9_5980hx | - | |
| amd | ryzen_3_3300u_firmware | * | |
| amd | ryzen_3_3300u | - | |
| amd | ryzen_3_3350u_firmware | * | |
| amd | ryzen_3_3350u | - | |
| amd | ryzen_5_3450u_firmware | * | |
| amd | ryzen_5_3450u | - | |
| amd | ryzen_5_3500u_firmware | * | |
| amd | ryzen_5_3500u | - | |
| amd | ryzen_5_3500c_firmware | * | |
| amd | ryzen_5_3500c | - | |
| amd | ryzen_5_3550h_firmware | * | |
| amd | ryzen_5_3550h | - | |
| amd | ryzen_5_3580u_firmware | * | |
| amd | ryzen_5_3580u | - | |
| amd | ryzen_7_3700u_firmware | * | |
| amd | ryzen_7_3700u | - | |
| amd | ryzen_7_3700c_firmware | * | |
| amd | ryzen_7_3700c | - | |
| amd | ryzen_7_3750h_firmware | * | |
| amd | ryzen_7_3750h | - | |
| amd | ryzen_7_3780u_firmware | * | |
| amd | ryzen_7_3780u | - | |
| amd | athlon_gold_3150c_firmware | * | |
| amd | athlon_gold_3150c | - | |
| amd | athlon_gold_3150u_firmware | * | |
| amd | athlon_gold_3150u | - | |
| amd | athlon_pro_3145b_firmware | * | |
| amd | athlon_pro_3145b | - | |
| amd | athlon_silver_3050c_firmware | * | |
| amd | athlon_silver_3050c | - | |
| amd | athlon_silver_3050u_firmware | * | |
| amd | athlon_silver_3050u | - | |
| amd | athlon_pro_3045b_firmware | * | |
| amd | athlon_pro_3045b | - | |
| amd | athlon_silver_3050e_firmware | * | |
| amd | athlon_silver_3050e | - | |
| amd | athlon_gold_pro_3150g_firmware | * | |
| amd | athlon_gold_pro_3150g | - | |
| amd | athlon_gold_3150g_firmware | * | |
| amd | athlon_gold_3150g | - | |
| amd | athlon_gold_pro_3150ge_firmware | * | |
| amd | athlon_gold_pro_3150ge | - | |
| amd | athlon_pro_300ge_firmware | * | |
| amd | athlon_pro_300ge | - | |
| amd | ryzen_3_4300ge_firmware | * | |
| amd | ryzen_3_4300ge | - | |
| amd | ryzen_5_4600ge_firmware | * | |
| amd | ryzen_5_4600ge | - | |
| amd | ryzen_7_4700ge_firmware | * | |
| amd | ryzen_7_4700ge | - | |
| amd | ryzen_3_4300g_firmware | * | |
| amd | ryzen_3_4300g | - | |
| amd | ryzen_5_4600g_firmware | * | |
| amd | ryzen_5_4600g | - | |
| amd | ryzen_7_4700g_firmware | * | |
| amd | ryzen_7_4700g | - | |
| amd | ryzen_3_5300ge_firmware | * | |
| amd | ryzen_3_5300ge | - | |
| amd | ryzen_3_5300g_firmware | * | |
| amd | ryzen_3_5300g | - | |
| amd | ryzen_5_5600ge_firmware | * | |
| amd | ryzen_5_5600ge | - | |
| amd | ryzen_5_5600g_firmware | * | |
| amd | ryzen_5_5600g | - | |
| amd | ryzen_7_5700ge_firmware | * | |
| amd | ryzen_7_5700ge | - | |
| amd | ryzen_7_5700g_firmware | * | |
| amd | ryzen_7_5700g | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094",
"versionEndExcluding": "23.12.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0",
"versionEndIncluding": "23.q4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1EFDD49-95E7-4E92-A476-9F7E9D2B222A",
"versionEndExcluding": "cezannepi-fp6_1.0.0.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "799912F4-2A5D-41F6-B645-5972B966617B",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7DEDAC-51F3-4B72-8958-72CFDB8572A0",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15FE9FAE-DEC6-42FA-8622-3D5B0C845928",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3770F180-FB7C-410F-B49D-D30AA05326BC",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF809F01-E6B3-4975-AC8B-EE2FDD199B14",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2AC7D6-47AB-4178-9585-34293B36F576",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C05D78A9-2CED-4BA1-8382-BC8D722E91D9",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8233A5D0-7796-4164-99CF-BB23B74563DF",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03194384-10A2-4B6D-BED1-C01908249969",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03BCFD6B-04D1-4A27-AB06-90F8BA894E2C",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "754DE9E2-F441-4D7F-BDAB-6ADED0F9D76A",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A192415A-41F1-4DF9-A351-A6E879E45431",
"versionEndExcluding": "comboam4pi_1.0.0.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76F10B69-9959-4977-893B-076BFBAC1BA6",
"versionEndExcluding": "comboam4pi_1.0.0.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7217BA72-D101-49C1-86B7-A63BFA01A056",
"versionEndExcluding": "comboam4pi_1.0.0.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "045D34B9-50A3-453D-A9E1-64180D1E1B5C",
"versionEndExcluding": "comboam4pi_1.0.0.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C52E5C9A-DC2E-428F-97CF-61C7340C0579",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62AB8A11-9C17-4528-A582-8340964C76A7",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E240139-34E9-4D68-AEBB-6E641C75AB82",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B184CA4-DA2E-4EF7-997C-BA563CB41A08",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40EDD65C-1101-4F0C-AD08-007A97D7184E",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DCE8037-1ED8-468A-9FBF-B79809A8089A",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2201670-E611-4C1E-BD06-E2B4262C3687",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B0598FA-5EB7-41FF-AC46-BFBCE1EA1271",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C51F223-5529-4D10-A7AF-44198DE58684",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35C8C0CE-AA13-434D-83BD-2DA454B1937C",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A8225E-A53A-4602-ACF6-F142D1CCF9FD",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF3486C1-EAD5-4861-8463-506D59A5F7DA",
"versionEndExcluding": "comboam4v2_pi_1.2.0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
},
{
"lang": "es",
"value": "Un atacante malicioso en x86 puede configurar mal las regiones de memoria confiable (TMR), lo que puede permitirle establecer un rango de direcciones arbitrario para la TMR, lo que podr\u00eda provocar una p\u00e9rdida de integridad y disponibilidad."
}
],
"id": "CVE-2021-26367",
"lastModified": "2024-12-12T20:41:56.120",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 5.2,
"source": "psirt@amd.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-08-13T17:15:17.360",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
},
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:28
Severity ?
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
References
| ▼ | URL | Tags | |
|---|---|---|---|
| psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| amd | radeon_software | * | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6450m | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6550m | - | |
| amd | radeon_rx_6550s | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6750_gre | - | |
| amd | radeon_rx_6750_xt | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_software | * | |
| amd | radeon_pro_w6300 | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094",
"versionEndExcluding": "23.12.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0",
"versionEndIncluding": "23.q4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service."
},
{
"lang": "es",
"value": "Una validaci\u00f3n de direcci\u00f3n DRAM insuficiente en PMFW puede permitir que un atacante privilegiado lea desde una direcci\u00f3n DRAM no v\u00e1lida a SRAM, lo que podr\u00eda provocar corrupci\u00f3n de datos o denegaci\u00f3n de servicio."
}
],
"id": "CVE-2023-20510",
"lastModified": "2024-12-12T20:28:55.010",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 4.2,
"source": "psirt@amd.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-08-13T17:15:18.777",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 08:01
Severity ?
Summary
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| amd | radeon_software | * | |
| amd | radeon_rx_5300 | - | |
| amd | radeon_rx_5300_xt | - | |
| amd | radeon_rx_5300m | - | |
| amd | radeon_rx_5500 | - | |
| amd | radeon_rx_5500_xt | - | |
| amd | radeon_rx_5500m | - | |
| amd | radeon_rx_5600 | - | |
| amd | radeon_rx_5600_xt | - | |
| amd | radeon_rx_5600m | - | |
| amd | radeon_rx_5700 | - | |
| amd | radeon_rx_5700_xt | - | |
| amd | radeon_rx_5700m | - | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6450m | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6550m | - | |
| amd | radeon_rx_6550s | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_rx_7600 | - | |
| amd | radeon_rx_7600m | - | |
| amd | radeon_rx_7600m_xt | - | |
| amd | radeon_rx_7600s | - | |
| amd | radeon_rx_7700_xt | - | |
| amd | radeon_rx_7700s | - | |
| amd | radeon_rx_7800_xt | - | |
| amd | radeon_rx_7900_gre | - | |
| amd | radeon_rx_7900_xt | - | |
| amd | radeon_rx_7900_xtx | - | |
| amd | radeon_rx_7900m | - | |
| amd | radeon_software | * | |
| amd | radeon_pro_w5500 | - | |
| amd | radeon_pro_w5500x | - | |
| amd | radeon_pro_w5700 | - | |
| amd | radeon_pro_w5700x | - | |
| amd | radeon_pro_w6300 | - | |
| amd | radeon_pro_w6300m | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6500m | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6600m | - | |
| amd | radeon_pro_w6600x | - | |
| amd | radeon_pro_w6800 | - | |
| amd | radeon_pro_w6800x | - | |
| amd | radeon_pro_w6800x_duo | - | |
| amd | radeon_pro_w6900x | - | |
| amd | radeon_pro_w7500 | - | |
| amd | radeon_pro_w7600 | - | |
| amd | radeon_pro_w7800 | - | |
| amd | radeon_rx_vega_56_firmware | - | |
| amd | radeon_rx_vega_56 | - | |
| amd | radeon_rx_vega_64_firmware | - | |
| amd | radeon_rx_vega_64 | - | |
| amd | radeon_pro_vega_56_firmware | - | |
| amd | radeon_pro_vega_56 | - | |
| amd | radeon_pro_vega_64_firmware | - | |
| amd | radeon_pro_vega_64 | - | |
| amd | radeon_software | * | |
| amd | radeon_software | * | |
| amd | ryzen_3_3015ce | - | |
| amd | ryzen_3_3015e | - | |
| amd | ryzen_3_4100 | - | |
| amd | ryzen_3_4300g | - | |
| amd | ryzen_3_4300ge | - | |
| amd | ryzen_3_4300u | - | |
| amd | ryzen_3_5300g | - | |
| amd | ryzen_3_5300ge | - | |
| amd | ryzen_3_5300u | - | |
| amd | ryzen_5_4500 | - | |
| amd | ryzen_5_4500u | - | |
| amd | ryzen_5_4600g | - | |
| amd | ryzen_5_4600ge | - | |
| amd | ryzen_5_4600h | - | |
| amd | ryzen_5_4600hs | - | |
| amd | ryzen_5_4600u | - | |
| amd | ryzen_5_4680u | - | |
| amd | ryzen_5_5500h | - | |
| amd | ryzen_5_5500u | - | |
| amd | ryzen_5_5600g | - | |
| amd | ryzen_5_5600ge | - | |
| amd | ryzen_5_pro_3200g | - | |
| amd | ryzen_5_pro_3200ge | - | |
| amd | ryzen_5_pro_3350g | - | |
| amd | ryzen_5_pro_3350ge | - | |
| amd | ryzen_5_pro_3400g | - | |
| amd | ryzen_5_pro_3400ge | - | |
| amd | ryzen_7_4700g | - | |
| amd | ryzen_7_4700ge | - | |
| amd | ryzen_7_4700u | - | |
| amd | ryzen_7_4800h | - | |
| amd | ryzen_7_4800hs | - | |
| amd | ryzen_7_4980u | - | |
| amd | ryzen_7_5700g | - | |
| amd | ryzen_7_5700ge | - | |
| amd | ryzen_7_5700u | - | |
| amd | ryzen_9_4900h | - | |
| amd | ryzen_9_4900hs | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
"versionEndExcluding": "23.7.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
"versionEndExcluding": "23.q3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
"versionEndExcluding": "23.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
"versionEndExcluding": "23.q3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n"
},
{
"lang": "es",
"value": "Una validaci\u00f3n de entrada incorrecta en el controlador de pantalla AMD RadeonTM Graphics puede permitir que un atacante da\u00f1e la pantalla, lo que podr\u00eda provocar una denegaci\u00f3n de servicio."
}
],
"id": "CVE-2023-31320",
"lastModified": "2024-11-21T08:01:46.340",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-11-14T19:15:25.070",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2025-05-01 15:15
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| amd | enterprise_driver | * | |
| amd | radeon_pro_software | * | |
| amd | radeon_software | * | |
| amd | radeon_pro_w5500 | - | |
| amd | radeon_pro_w5500x | - | |
| amd | radeon_pro_w5700 | - | |
| amd | radeon_pro_w5700x | - | |
| amd | radeon_pro_w6300m | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6500m | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6600m | - | |
| amd | radeon_pro_w6600x | - | |
| amd | radeon_pro_w6800 | - | |
| amd | radeon_pro_w6800x | - | |
| amd | radeon_pro_w6800x_duo | - | |
| amd | radeon_pro_w6900x | - | |
| amd | radeon_rx_5300 | - | |
| amd | radeon_rx_5300_xt | - | |
| amd | radeon_rx_5300m | - | |
| amd | radeon_rx_5500 | - | |
| amd | radeon_rx_5500_xt | - | |
| amd | radeon_rx_5500m | - | |
| amd | radeon_rx_5600 | - | |
| amd | radeon_rx_5600_xt | - | |
| amd | radeon_rx_5600m | - | |
| amd | radeon_rx_5700 | - | |
| amd | radeon_rx_5700_xt | - | |
| amd | radeon_rx_5700m | - | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6750_xt | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_rx_vega_56_firmware | - | |
| amd | radeon_rx_vega_56 | - | |
| amd | radeon_rx_vega_64_firmware | - | |
| amd | radeon_rx_vega_64 | - | |
| amd | ryzen_3_5300ge_firmware | - | |
| amd | ryzen_3_5300ge | - | |
| amd | ryzen_3_5300g_firmware | - | |
| amd | ryzen_3_5300g | - | |
| amd | ryzen_5_5600ge_firmware | - | |
| amd | ryzen_5_5600ge | - | |
| amd | ryzen_5_5600g_firmware | - | |
| amd | ryzen_5_5600g | - | |
| amd | ryzen_7_5700ge_firmware | - | |
| amd | ryzen_7_5700ge | - | |
| amd | ryzen_7_5700g_firmware | - | |
| amd | ryzen_7_5700g | - | |
| amd | ryzen_3_5300u_firmware | - | |
| amd | ryzen_3_5300u | - | |
| amd | ryzen_5_5500u_firmware | - | |
| amd | ryzen_5_5500u | - | |
| amd | ryzen_7_5700u_firmware | - | |
| amd | ryzen_7_5700u | - | |
| amd | ryzen_3_5400u_firmware | - | |
| amd | ryzen_3_5400u | - | |
| amd | ryzen_5_5560u_firmware | - | |
| amd | ryzen_5_5560u | - | |
| amd | ryzen_5_5600u_firmware | - | |
| amd | ryzen_5_5600u | - | |
| amd | ryzen_5_5600h_firmware | - | |
| amd | ryzen_5_5600h | - | |
| amd | ryzen_5_5600hs_firmware | - | |
| amd | ryzen_5_5600hs | - | |
| amd | ryzen_7_5800u_firmware | - | |
| amd | ryzen_7_5800u | - | |
| amd | ryzen_7_5800h_firmware | - | |
| amd | ryzen_7_5800h | - | |
| amd | ryzen_7_5800hs_firmware | - | |
| amd | ryzen_7_5800hs | - | |
| amd | ryzen_9_5900hs_firmware | - | |
| amd | ryzen_9_5900hs | - | |
| amd | ryzen_9_5900hx_firmware | - | |
| amd | ryzen_9_5900hx | - | |
| amd | ryzen_9_5980hs_firmware | - | |
| amd | ryzen_9_5980hs | - | |
| amd | ryzen_9_5980hx_firmware | - | |
| amd | ryzen_9_5980hx | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
"versionEndExcluding": "22.10.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
"versionEndExcluding": "22.q2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
"versionEndExcluding": "22.5.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel."
},
{
"lang": "es",
"value": "La verificaci\u00f3n insuficiente de m\u00faltiples firmas de encabezado mientras se carga una aplicaci\u00f3n confiable (TA) puede permitir que un atacante con privilegios obtenga la ejecuci\u00f3n de c\u00f3digo en esa TA o el sistema operativo/kernel."
}
],
"id": "CVE-2021-26391",
"lastModified": "2025-05-01T15:15:54.320",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-11-09T21:15:12.150",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2025-02-13 17:16
Severity ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
| ▼ | URL | Tags | |
|---|---|---|---|
| psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
| psirt@amd.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| intel | radeon_rx_vega_m_firmware | * | |
| intel | core_i5-8305g | - | |
| intel | core_i7-8705g | - | |
| intel | core_i7-8706g | - | |
| intel | core_i7-8709g | - | |
| intel | nuc_8_enthusiast_nuc8i7hnkqc | - | |
| intel | nuc_8_enthusiast_nuc8i7hvkva | - | |
| intel | nuc_8_enthusiast_nuc8i7hvkvaw | - | |
| intel | nuc_kit_nuc8i7hnk | - | |
| intel | nuc_kit_nuc8i7hvk | - | |
| amd | radeon_software | * | |
| amd | radeon_rx_5300 | - | |
| amd | radeon_rx_5300_xt | - | |
| amd | radeon_rx_5300m | - | |
| amd | radeon_rx_5500 | - | |
| amd | radeon_rx_5500_xt | - | |
| amd | radeon_rx_5500m | - | |
| amd | radeon_rx_5600 | - | |
| amd | radeon_rx_5600_xt | - | |
| amd | radeon_rx_5600m | - | |
| amd | radeon_rx_5700 | - | |
| amd | radeon_rx_5700_xt | - | |
| amd | radeon_rx_5700m | - | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6450m | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6550m | - | |
| amd | radeon_rx_6550s | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_rx_7600 | - | |
| amd | radeon_rx_7600m | - | |
| amd | radeon_rx_7600m_xt | - | |
| amd | radeon_rx_7600s | - | |
| amd | radeon_rx_7700_xt | - | |
| amd | radeon_rx_7700s | - | |
| amd | radeon_rx_7800_xt | - | |
| amd | radeon_rx_7900_gre | - | |
| amd | radeon_rx_7900_xt | - | |
| amd | radeon_rx_7900_xtx | - | |
| amd | radeon_rx_7900m | - | |
| amd | radeon_software | * | |
| amd | radeon_pro_w5500 | - | |
| amd | radeon_pro_w5500x | - | |
| amd | radeon_pro_w5700 | - | |
| amd | radeon_pro_w5700x | - | |
| amd | radeon_pro_w6300 | - | |
| amd | radeon_pro_w6300m | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6500m | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6600m | - | |
| amd | radeon_pro_w6600x | - | |
| amd | radeon_pro_w6800 | - | |
| amd | radeon_pro_w6800x | - | |
| amd | radeon_pro_w6800x_duo | - | |
| amd | radeon_pro_w6900x | - | |
| amd | radeon_pro_w7500 | - | |
| amd | radeon_pro_w7600 | - | |
| amd | radeon_pro_w7800 | - | |
| amd | radeon_rx_vega_56_firmware | - | |
| amd | radeon_rx_vega_56 | - | |
| amd | radeon_rx_vega_64_firmware | - | |
| amd | radeon_rx_vega_64 | - | |
| amd | radeon_pro_vega_56_firmware | - | |
| amd | radeon_pro_vega_56 | - | |
| amd | radeon_pro_vega_64_firmware | - | |
| amd | radeon_pro_vega_64 | - | |
| amd | radeon_software | * | |
| amd | radeon_software | * | |
| amd | ryzen_3_3015ce | - | |
| amd | ryzen_3_3015e | - | |
| amd | ryzen_3_4100 | - | |
| amd | ryzen_3_4300g | - | |
| amd | ryzen_3_4300ge | - | |
| amd | ryzen_3_4300u | - | |
| amd | ryzen_3_5300g | - | |
| amd | ryzen_3_5300ge | - | |
| amd | ryzen_3_5300u | - | |
| amd | ryzen_5_4500 | - | |
| amd | ryzen_5_4500u | - | |
| amd | ryzen_5_4600g | - | |
| amd | ryzen_5_4600ge | - | |
| amd | ryzen_5_4600h | - | |
| amd | ryzen_5_4600hs | - | |
| amd | ryzen_5_4600u | - | |
| amd | ryzen_5_4680u | - | |
| amd | ryzen_5_5500h | - | |
| amd | ryzen_5_5500u | - | |
| amd | ryzen_5_5600g | - | |
| amd | ryzen_5_5600ge | - | |
| amd | ryzen_5_pro_3200g | - | |
| amd | ryzen_5_pro_3200ge | - | |
| amd | ryzen_5_pro_3350g | - | |
| amd | ryzen_5_pro_3350ge | - | |
| amd | ryzen_5_pro_3400g | - | |
| amd | ryzen_5_pro_3400ge | - | |
| amd | ryzen_7_4700g | - | |
| amd | ryzen_7_4700ge | - | |
| amd | ryzen_7_4700u | - | |
| amd | ryzen_7_4800h | - | |
| amd | ryzen_7_4800hs | - | |
| amd | ryzen_7_4980u | - | |
| amd | ryzen_7_5700g | - | |
| amd | ryzen_7_5700ge | - | |
| amd | ryzen_7_5700u | - | |
| amd | ryzen_9_4900h | - | |
| amd | ryzen_9_4900hs | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4",
"versionEndExcluding": "23.10.01.46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A4CCCB-01CC-4488-9336-C0C379ABE609",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
"versionEndExcluding": "23.7.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
"versionEndExcluding": "23.q3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
"versionEndExcluding": "23.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
"versionEndExcluding": "23.q3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution."
},
{
"lang": "es",
"value": "La verificaci\u00f3n inadecuada de la firma del controlador RadeonTM RX Vega M Graphics para Windows puede permitir que un atacante con privilegios de administrador inicie AMDSoftwareInstaller.exe sin validar la firma del archivo, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"id": "CVE-2023-20567",
"lastModified": "2025-02-13T17:16:01.443",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-11-14T19:15:15.880",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2025-05-01 15:15
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| amd | enterprise_driver | * | |
| amd | radeon_pro_software | * | |
| amd | radeon_software | * | |
| amd | radeon_pro_w6300m | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6500m | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6600m | - | |
| amd | radeon_pro_w6600x | - | |
| amd | radeon_pro_w6800 | - | |
| amd | radeon_pro_w6800x | - | |
| amd | radeon_pro_w6800x_duo | - | |
| amd | radeon_pro_w6900x | - | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6750_xt | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
"versionEndExcluding": "22.10.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
"versionEndExcluding": "22.q2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
"versionEndExcluding": "22.5.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor\u2019s encrypted memory contents which may lead to arbitrary code execution in ASP."
},
{
"lang": "es",
"value": "Un atacante con acceso local al sistema puede realizar modificaciones no autorizadas en la configuraci\u00f3n de seguridad de los registros SOC. Esto podr\u00eda permitir una posible corrupci\u00f3n del contenido de la memoria cifrada del procesador seguro AMD, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en ASP."
}
],
"id": "CVE-2021-26360",
"lastModified": "2025-05-01T15:15:54.130",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-11-09T21:15:11.690",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
References
| ▼ | URL | Tags | |
|---|---|---|---|
| psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
| psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| amd | enterprise_driver | * | |
| amd | radeon_pro_software | * | |
| amd | radeon_software | * | |
| amd | radeon_pro_w5500 | - | |
| amd | radeon_pro_w5500x | - | |
| amd | radeon_pro_w5700 | - | |
| amd | radeon_pro_w5700x | - | |
| amd | radeon_pro_w6300m | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6500m | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6600m | - | |
| amd | radeon_pro_w6600x | - | |
| amd | radeon_pro_w6800 | - | |
| amd | radeon_pro_w6800x | - | |
| amd | radeon_pro_w6800x_duo | - | |
| amd | radeon_pro_w6900x | - | |
| amd | radeon_rx_5300 | - | |
| amd | radeon_rx_5300_xt | - | |
| amd | radeon_rx_5300m | - | |
| amd | radeon_rx_5500 | - | |
| amd | radeon_rx_5500_xt | - | |
| amd | radeon_rx_5500m | - | |
| amd | radeon_rx_5600 | - | |
| amd | radeon_rx_5600_xt | - | |
| amd | radeon_rx_5600m | - | |
| amd | radeon_rx_5700 | - | |
| amd | radeon_rx_5700_xt | - | |
| amd | radeon_rx_5700m | - | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6750_xt | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_rx_vega_56_firmware | - | |
| amd | radeon_rx_vega_56 | - | |
| amd | radeon_rx_vega_64_firmware | - | |
| amd | radeon_rx_vega_64 | - | |
| amd | ryzen_3_2200ge_firmware | - | |
| amd | ryzen_3_2200ge | - | |
| amd | ryzen_3_2200g_firmware | - | |
| amd | ryzen_3_2200g | - | |
| amd | ryzen_5_2400ge_firmware | - | |
| amd | ryzen_5_2400ge | - | |
| amd | ryzen_5_2400g_firmware | - | |
| amd | ryzen_5_2400g | - | |
| amd | ryzen_3_5300ge_firmware | - | |
| amd | ryzen_3_5300ge | - | |
| amd | ryzen_3_5300g_firmware | - | |
| amd | ryzen_3_5300g | - | |
| amd | ryzen_5_5600ge_firmware | - | |
| amd | ryzen_5_5600ge | - | |
| amd | ryzen_5_5600g_firmware | - | |
| amd | ryzen_5_5600g | - | |
| amd | ryzen_7_5700ge_firmware | - | |
| amd | ryzen_7_5700ge | - | |
| amd | ryzen_7_5700g_firmware | - | |
| amd | ryzen_7_5700g | - | |
| amd | athlon_silver_3050e_firmware | - | |
| amd | athlon_silver_3050e | - | |
| amd | athlon_pro_3045b_firmware | - | |
| amd | athlon_pro_3045b | - | |
| amd | athlon_silver_3050u_firmware | - | |
| amd | athlon_silver_3050u | - | |
| amd | athlon_silver_3050c_firmware | - | |
| amd | athlon_silver_3050c | - | |
| amd | athlon_pro_3145b_firmware | - | |
| amd | athlon_pro_3145b | - | |
| amd | athlon_gold_3150u_firmware | - | |
| amd | athlon_gold_3150u | - | |
| amd | athlon_gold_3150c_firmware | - | |
| amd | athlon_gold_3150c | - | |
| amd | ryzen_3_3250u_firmware | - | |
| amd | ryzen_3_3250u | - | |
| amd | ryzen_3_3250c_firmware | - | |
| amd | ryzen_3_3250c | - | |
| amd | amd_3020e_firmware | - | |
| amd | amd_3020e | - | |
| amd | amd_3015e_firmware | - | |
| amd | amd_3015e | - | |
| amd | amd_3015ce_firmware | - | |
| amd | amd_3015ce | - | |
| amd | ryzen_3_2200u_firmware | - | |
| amd | ryzen_3_2200u | - | |
| amd | ryzen_3_2300u_firmware | - | |
| amd | ryzen_3_2300u | - | |
| amd | ryzen_5_2500u_firmware | - | |
| amd | ryzen_5_2500u | - | |
| amd | ryzen_5_2600h_firmware | - | |
| amd | ryzen_5_2600h | - | |
| amd | ryzen_7_2700u_firmware | - | |
| amd | ryzen_7_2700u | - | |
| amd | ryzen_7_2800h_firmware | - | |
| amd | ryzen_7_2800h | - | |
| amd | ryzen_3_3300u_firmware | - | |
| amd | ryzen_3_3300u | - | |
| amd | ryzen_3_3350u_firmware | - | |
| amd | ryzen_3_3350u | - | |
| amd | ryzen_5_3450u_firmware | - | |
| amd | ryzen_5_3450u | - | |
| amd | ryzen_5_3500u_firmware | - | |
| amd | ryzen_5_3500u | - | |
| amd | ryzen_5_3500c_firmware | - | |
| amd | ryzen_5_3500c | - | |
| amd | ryzen_5_3550h_firmware | - | |
| amd | ryzen_5_3550h | - | |
| amd | ryzen_5_3580u_firmware | - | |
| amd | ryzen_5_3580u | - | |
| amd | ryzen_7_3700u_firmware | - | |
| amd | ryzen_7_3700u | - | |
| amd | ryzen_7_3700c_firmware | - | |
| amd | ryzen_7_3700c | - | |
| amd | ryzen_7_3750h_firmware | - | |
| amd | ryzen_7_3750h | - | |
| amd | ryzen_7_3780u_firmware | - | |
| amd | ryzen_7_3780u | - | |
| amd | ryzen_3_pro_3200ge_firmware | - | |
| amd | ryzen_3_pro_3200ge | - | |
| amd | ryzen_3_3200g_firmware | - | |
| amd | ryzen_3_3200g | - | |
| amd | ryzen_3_pro_3200g_firmware | - | |
| amd | ryzen_3_pro_3200g | - | |
| amd | ryzen_5_pro_3350ge_firmware | - | |
| amd | ryzen_5_pro_3350ge | - | |
| amd | ryzen_5_pro_3350g_firmware | - | |
| amd | ryzen_5_pro_3350g | - | |
| amd | ryzen_5_pro_3400ge_firmware | - | |
| amd | ryzen_5_pro_3400ge | - | |
| amd | ryzen_5_pro_3400g_firmware | - | |
| amd | ryzen_5_pro_3400g | - | |
| amd | ryzen_5_3400g_firmware | - | |
| amd | ryzen_5_3400g | - | |
| amd | ryzen_3_5300u_firmware | - | |
| amd | ryzen_3_5300u | - | |
| amd | ryzen_5_5500u_firmware | - | |
| amd | ryzen_5_5500u | - | |
| amd | ryzen_7_5700u_firmware | - | |
| amd | ryzen_7_5700u | - | |
| amd | ryzen_3_5400u_firmware | - | |
| amd | ryzen_3_5400u | - | |
| amd | ryzen_5_5560u_firmware | - | |
| amd | ryzen_5_5560u | - | |
| amd | ryzen_5_5600u_firmware | - | |
| amd | ryzen_5_5600u | - | |
| amd | ryzen_5_5600h_firmware | - | |
| amd | ryzen_5_5600h | - | |
| amd | ryzen_5_5600hs_firmware | - | |
| amd | ryzen_5_5600hs | - | |
| amd | ryzen_7_5800u_firmware | - | |
| amd | ryzen_7_5800u | - | |
| amd | ryzen_7_5800h_firmware | - | |
| amd | ryzen_7_5800h | - | |
| amd | ryzen_7_5800hs_firmware | - | |
| amd | ryzen_7_5800hs | - | |
| amd | ryzen_9_5900hs_firmware | - | |
| amd | ryzen_9_5900hs | - | |
| amd | ryzen_9_5900hx_firmware | - | |
| amd | ryzen_9_5900hx | - | |
| amd | ryzen_9_5980hs_firmware | - | |
| amd | ryzen_9_5980hs | - | |
| amd | ryzen_9_5980hx_firmware | - | |
| amd | ryzen_9_5980hx | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
"versionEndExcluding": "22.10.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
"versionEndExcluding": "22.q2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
"versionEndExcluding": "22.5.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6882B4E1-0BFF-4093-BE67-72294949C3F8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E741A31-8265-45E0-9834-23D00D5F8176",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "913A2DC9-4215-486B-BD15-3AF515E3CDCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DF8A936-58AE-44BB-897E-44782232394F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9FC3889-3F62-48AC-876D-5A630A5E2AD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D79E460A-D34C-4120-8529-F32988793DC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "069392FC-51DB-49F0-B30B-8ED46C694057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51D4403E-C626-4817-B0C9-ECEC420C517D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58EE3F9B-6950-4F83-B0BE-ADA560457BC1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "945182A3-1BE3-459D-BC45-5554FB905C3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality."
},
{
"lang": "es",
"value": "Una limpieza de memoria insuficiente en AMD Secure Processor (ASP) Trusted Execution Environment (TEE) puede permitir que un atacante autenticado con privilegios genere un TA firmado v\u00e1lido y potencialmente envenenar el contenido de la memoria del proceso con datos controlados por el atacante, lo que resulta en una p\u00e9rdida de confidencialidad."
}
],
"id": "CVE-2021-26393",
"lastModified": "2024-11-21T05:56:17.503",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-11-09T21:15:12.607",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
},
{
"source": "psirt@amd.com",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-13 16:30
Severity ?
2.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
References
| ▼ | URL | Tags | |
|---|---|---|---|
| psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| amd | radeon_software | * | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6450m | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6550m | - | |
| amd | radeon_rx_6550s | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6750_gre | - | |
| amd | radeon_rx_6750_xt | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_software | * | |
| amd | radeon_pro_w6300 | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6800 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094",
"versionEndExcluding": "23.12.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0",
"versionEndIncluding": "23.q4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service."
},
{
"lang": "es",
"value": "La validaci\u00f3n inadecuada del \u00edndice de matriz en el firmware de administraci\u00f3n de energ\u00eda (PMFW) puede permitir que un atacante privilegiado provoque una lectura de memoria fuera de los l\u00edmites dentro de PMFW, lo que podr\u00eda provocar una denegaci\u00f3n de servicio."
}
],
"id": "CVE-2023-31307",
"lastModified": "2024-12-13T16:30:30.840",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4,
"source": "psirt@amd.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-08-13T17:15:20.500",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-129"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-129"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2025-02-13 17:16
Severity ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
References
| ▼ | URL | Tags | |
|---|---|---|---|
| psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
| psirt@amd.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| intel | radeon_rx_vega_m_firmware | * | |
| intel | core_i5-8305g | - | |
| intel | core_i7-8705g | - | |
| intel | core_i7-8706g | - | |
| intel | core_i7-8709g | - | |
| intel | nuc_8_enthusiast_nuc8i7hnkqc | - | |
| intel | nuc_8_enthusiast_nuc8i7hvkva | - | |
| intel | nuc_8_enthusiast_nuc8i7hvkvaw | - | |
| intel | nuc_kit_nuc8i7hnk | - | |
| intel | nuc_kit_nuc8i7hvk | - | |
| amd | radeon_software | * | |
| amd | radeon_rx_5300 | - | |
| amd | radeon_rx_5300_xt | - | |
| amd | radeon_rx_5300m | - | |
| amd | radeon_rx_5500 | - | |
| amd | radeon_rx_5500_xt | - | |
| amd | radeon_rx_5500m | - | |
| amd | radeon_rx_5600 | - | |
| amd | radeon_rx_5600_xt | - | |
| amd | radeon_rx_5600m | - | |
| amd | radeon_rx_5700 | - | |
| amd | radeon_rx_5700_xt | - | |
| amd | radeon_rx_5700m | - | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6450m | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6550m | - | |
| amd | radeon_rx_6550s | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800m | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6850m_xt | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_rx_7600 | - | |
| amd | radeon_rx_7600m | - | |
| amd | radeon_rx_7600m_xt | - | |
| amd | radeon_rx_7600s | - | |
| amd | radeon_rx_7700_xt | - | |
| amd | radeon_rx_7700s | - | |
| amd | radeon_rx_7800_xt | - | |
| amd | radeon_rx_7900_gre | - | |
| amd | radeon_rx_7900_xt | - | |
| amd | radeon_rx_7900_xtx | - | |
| amd | radeon_rx_7900m | - | |
| amd | radeon_software | * | |
| amd | radeon_pro_w5500 | - | |
| amd | radeon_pro_w5500x | - | |
| amd | radeon_pro_w5700 | - | |
| amd | radeon_pro_w5700x | - | |
| amd | radeon_pro_w6300 | - | |
| amd | radeon_pro_w6300m | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6500m | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6600m | - | |
| amd | radeon_pro_w6600x | - | |
| amd | radeon_pro_w6800 | - | |
| amd | radeon_pro_w6800x | - | |
| amd | radeon_pro_w6800x_duo | - | |
| amd | radeon_pro_w6900x | - | |
| amd | radeon_pro_w7500 | - | |
| amd | radeon_pro_w7600 | - | |
| amd | radeon_pro_w7800 | - | |
| amd | radeon_rx_vega_56_firmware | - | |
| amd | radeon_rx_vega_56 | - | |
| amd | radeon_rx_vega_64_firmware | - | |
| amd | radeon_rx_vega_64 | - | |
| amd | radeon_pro_vega_56_firmware | - | |
| amd | radeon_pro_vega_56 | - | |
| amd | radeon_pro_vega_64_firmware | - | |
| amd | radeon_pro_vega_64 | - | |
| amd | radeon_software | * | |
| amd | radeon_software | * | |
| amd | ryzen_3_3015ce | - | |
| amd | ryzen_3_3015e | - | |
| amd | ryzen_3_4100 | - | |
| amd | ryzen_3_4300g | - | |
| amd | ryzen_3_4300ge | - | |
| amd | ryzen_3_4300u | - | |
| amd | ryzen_3_5300g | - | |
| amd | ryzen_3_5300ge | - | |
| amd | ryzen_3_5300u | - | |
| amd | ryzen_5_4500 | - | |
| amd | ryzen_5_4500u | - | |
| amd | ryzen_5_4600g | - | |
| amd | ryzen_5_4600ge | - | |
| amd | ryzen_5_4600h | - | |
| amd | ryzen_5_4600hs | - | |
| amd | ryzen_5_4600u | - | |
| amd | ryzen_5_4680u | - | |
| amd | ryzen_5_5500h | - | |
| amd | ryzen_5_5500u | - | |
| amd | ryzen_5_5600g | - | |
| amd | ryzen_5_5600ge | - | |
| amd | ryzen_5_pro_3200g | - | |
| amd | ryzen_5_pro_3200ge | - | |
| amd | ryzen_5_pro_3350g | - | |
| amd | ryzen_5_pro_3350ge | - | |
| amd | ryzen_5_pro_3400g | - | |
| amd | ryzen_5_pro_3400ge | - | |
| amd | ryzen_7_4700g | - | |
| amd | ryzen_7_4700ge | - | |
| amd | ryzen_7_4700u | - | |
| amd | ryzen_7_4800h | - | |
| amd | ryzen_7_4800hs | - | |
| amd | ryzen_7_4980u | - | |
| amd | ryzen_7_5700g | - | |
| amd | ryzen_7_5700ge | - | |
| amd | ryzen_7_5700u | - | |
| amd | ryzen_9_4900h | - | |
| amd | ryzen_9_4900hs | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4",
"versionEndExcluding": "23.10.01.46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A4CCCB-01CC-4488-9336-C0C379ABE609",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
"versionEndExcluding": "23.7.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
"versionEndExcluding": "23.q3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
"versionEndExcluding": "23.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
"versionEndExcluding": "23.q3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution."
},
{
"lang": "es",
"value": "La verificaci\u00f3n inadecuada de la firma del controlador RadeonTM RX Vega M Graphics para Windows puede permitir que un atacante con privilegios de administrador inicie RadeonInstaller.exe sin validar la firma del archivo, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"id": "CVE-2023-20568",
"lastModified": "2025-02-13T17:16:01.573",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-11-14T19:15:15.930",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
Published
2023-10-17 14:15
Modified
2024-11-21 07:41
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| amd | radeon_software | * | |
| amd | radeon_rx_5300 | - | |
| amd | radeon_rx_5300_xt | - | |
| amd | radeon_rx_5300m | - | |
| amd | radeon_rx_5500 | - | |
| amd | radeon_rx_5500_xt | - | |
| amd | radeon_rx_5500m | - | |
| amd | radeon_rx_5600 | - | |
| amd | radeon_rx_5600_xt | - | |
| amd | radeon_rx_5600m | - | |
| amd | radeon_rx_5700 | - | |
| amd | radeon_rx_5700_xt | - | |
| amd | radeon_rx_5700m | - | |
| amd | radeon_rx_6300m | - | |
| amd | radeon_rx_6400 | - | |
| amd | radeon_rx_6450m | - | |
| amd | radeon_rx_6500_xt | - | |
| amd | radeon_rx_6500m | - | |
| amd | radeon_rx_6550m | - | |
| amd | radeon_rx_6550s | - | |
| amd | radeon_rx_6600 | - | |
| amd | radeon_rx_6600_xt | - | |
| amd | radeon_rx_6600m | - | |
| amd | radeon_rx_6600s | - | |
| amd | radeon_rx_6650_xt | - | |
| amd | radeon_rx_6650m | - | |
| amd | radeon_rx_6650m_xt | - | |
| amd | radeon_rx_6700 | - | |
| amd | radeon_rx_6700_xt | - | |
| amd | radeon_rx_6700m | - | |
| amd | radeon_rx_6700s | - | |
| amd | radeon_rx_6750_gre_10gb | - | |
| amd | radeon_rx_6750_gre_12gb | - | |
| amd | radeon_rx_6750_xt | - | |
| amd | radeon_rx_6800 | - | |
| amd | radeon_rx_6800_xt | - | |
| amd | radeon_rx_6800s | - | |
| amd | radeon_rx_6900_xt | - | |
| amd | radeon_rx_6950_xt | - | |
| amd | radeon_rx_7600 | - | |
| amd | radeon_rx_7600m | - | |
| amd | radeon_rx_7600m_xt | - | |
| amd | radeon_rx_7600s | - | |
| amd | radeon_rx_7700_xt | - | |
| amd | radeon_rx_7700s | - | |
| amd | radeon_rx_7800_xt | - | |
| amd | radeon_rx_7900_gre | - | |
| amd | radeon_rx_7900_xt | - | |
| amd | radeon_rx_7900_xtx | - | |
| amd | radeon_rx_7900m | - | |
| amd | radeon_software | * | |
| amd | radeon_pro_w5500 | - | |
| amd | radeon_pro_w5700 | - | |
| amd | radeon_pro_w6300 | - | |
| amd | radeon_pro_w6400 | - | |
| amd | radeon_pro_w6600 | - | |
| amd | radeon_pro_w6800 | - | |
| amd | radeon_pro_w7500 | - | |
| amd | radeon_pro_w7600 | - | |
| amd | radeon_pro_w7800 | - | |
| amd | radeon_pro_w7900 | - | |
| amd | radeon_software | * | |
| amd | radeon_software | * | |
| amd | ryzen_3_7320u | - | |
| amd | ryzen_3_7335u | - | |
| amd | ryzen_3_7440u | - | |
| amd | ryzen_5_6600h | - | |
| amd | ryzen_5_6600hs | - | |
| amd | ryzen_5_6600u | - | |
| amd | ryzen_5_7500f | - | |
| amd | ryzen_5_7520u | - | |
| amd | ryzen_5_7535hs | - | |
| amd | ryzen_5_7535u | - | |
| amd | ryzen_5_7540u | - | |
| amd | ryzen_5_7600 | - | |
| amd | ryzen_5_7600x | - | |
| amd | ryzen_5_7640h | - | |
| amd | ryzen_5_7640u | - | |
| amd | ryzen_5_7645hx | - | |
| amd | ryzen_5_pro_7640hs | - | |
| amd | ryzen_5_pro_7645 | - | |
| amd | ryzen_7_6800h | - | |
| amd | ryzen_7_6800hs | - | |
| amd | ryzen_7_6800u | - | |
| amd | ryzen_7_7700 | - | |
| amd | ryzen_7_7700x | - | |
| amd | ryzen_7_7735hs | - | |
| amd | ryzen_7_7735u | - | |
| amd | ryzen_7_7736u | - | |
| amd | ryzen_7_7745hx | - | |
| amd | ryzen_7_7800x3d | - | |
| amd | ryzen_7_7840h | - | |
| amd | ryzen_7_7840u | - | |
| amd | ryzen_7_pro_7745 | - | |
| amd | ryzen_7_pro_7840hs | - | |
| amd | ryzen_9_6900hs | - | |
| amd | ryzen_9_6900hx | - | |
| amd | ryzen_9_6980hs | - | |
| amd | ryzen_9_6980hx | - | |
| amd | ryzen_9_7845hx | - | |
| amd | ryzen_9_7900 | - | |
| amd | ryzen_9_7900x | - | |
| amd | ryzen_9_7900x3d | - | |
| amd | ryzen_9_7940h | - | |
| amd | ryzen_9_7945hx | - | |
| amd | ryzen_9_7945hx3d | - | |
| amd | ryzen_9_7950x | - | |
| amd | ryzen_9_7950x3d | - | |
| amd | ryzen_9_pro_7940hs | - | |
| amd | ryzen_9_pro_7945 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "7162DB91-6B5C-4575-A8D0-B83B34908BE5",
"versionEndExcluding": "23.9.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BB37AAC-3957-4840-B47E-ED678F0B6044",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA1DA067-DE94-4663-91CD-A70CC386D45A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "2841E9B4-728C-4201-AAF1-3250A1DC08F3",
"versionEndExcluding": "23.q4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFF5CD86-64D3-4F02-9971-AC50E8052986",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
"matchCriteriaId": "7162DB91-6B5C-4575-A8D0-B83B34908BE5",
"versionEndExcluding": "23.9.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "2841E9B4-728C-4201-AAF1-3250A1DC08F3",
"versionEndExcluding": "23.q4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48F04B9F-8C65-476B-B5D8-18CC96E3B712",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "495E436C-B0EE-4B72-AB49-332F4752C140",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C4FDE72-050C-4A72-A4F4-9C1D5273CADD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1232B034-1214-4F9A-823D-DC76D5C5956B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0870FBE4-92B4-4717-88B0-EC1094268034",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE36D471-57BF-4385-A825-029F7313E4DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082BE536-F29C-4A73-B030-A19DD3A448B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6740A06F-4512-427D-9CB9-A4A6DB046BA3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C05D51F-469D-487D-9FC8-E1AD699A6F74",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC5E111-A7AA-4A45-A2E3-47013F9135D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB5D5B25-F32A-493E-BD54-57098981E15A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E3657C6-1047-4CA9-8D44-C7143F7D877D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2787C72-42D5-42B0-BE5B-E548B319BCF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76121981-8DC2-4779-833E-4B15CFCF7FC3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "225E8405-04FF-4885-92C8-8581ACC66E06",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D50E8EA-ECB2-463D-BA51-D13CF5A02266",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69289284-2ED2-4D8B-8AE2-B835AAF31EAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA6CD984-A8C7-4B23-8FF9-896C503EBA37",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D0429F-F186-4F78-9AE0-574E3A39926D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8480A7E0-882C-4B03-ADBC-697304B0B7C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD27234D-ACFC-4144-8980-2B706822C579",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5602B902-9FDB-4946-BE4C-236262285F2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA666DF3-C5F3-4127-A8EE-B784DD41F642",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86CAA682-9666-4929-B1AC-D9DB3109DB1A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A7E6806-A7AC-4C96-960B-B8934CEA2439",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74DD4A40-B712-4B54-9CC7-0BFD79E917BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82CCEE11-392D-4486-A6AD-CB64FB8B7081",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F05C8669-6348-4A1B-B1D4-D22022E1F67E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "018A02C9-2A5C-43E2-8CCD-4D03C119C22B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3DE32CA-168F-4812-AEAE-D771EB01E15D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\n\n\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n"
},
{
"lang": "es",
"value": "Una gesti\u00f3n de privilegios inadecuada en el controlador de gr\u00e1ficos AMD Radeon\u2122 puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones f\u00edsicas arbitrarias, lo que resulta en una posible ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"id": "CVE-2023-20598",
"lastModified": "2024-11-21T07:41:12.177",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-10-17T14:15:09.813",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}