CVE-2022-23815
Vulnerability from cvelistv5
Published
2024-08-13 16:51
Modified
2024-08-19 17:17
Severity ?
EPSS score ?
Summary
Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html | Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "athlon_3000g", "vendor": "amd", "versions": [ { "status": "affected", "version": "various" }, { "status": "unaffected", "version": "1.0.0.F" }, { "status": "unaffected", "version": "1.0.0.5" }, { "status": "unaffected", "version": "1.0.0.E" } ] }, { "cpes": [ "cpe:2.3:a:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_embedded_r1000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.2.0.A" } ] }, { "cpes": [ "cpe:2.3:a:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_embedded_r2000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.2" } ] }, { "cpes": [ "cpe:2.3:a:amd:ryzen_embedded_v1000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_embedded_v1000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.2.0.A" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2022-23815", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-19T17:04:47.953819Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-19T17:17:18.251Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various", "versionType": "PI" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PicassoPI-FP5 1.0.0.F" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PollockPI-FT5 1.0.0.5" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PicassoPI-FP5 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD RyzenTM Embedded R1000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP5 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD RyzenTM Embedded R2000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedR2KPI-FP5 1.0.0.2" } ] }, { "defaultStatus": "affected", "product": "AMD RyzenTM Embedded V1000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP5 1.2.0.A" } ] } ], "datePublic": "2024-08-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:51:43.735Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2022-23815", "datePublished": "2024-08-13T16:51:43.735Z", "dateReserved": "2022-01-21T17:14:12.301Z", "dateUpdated": "2024-08-19T17:17:18.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-23815\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2024-08-13T17:15:18.197\",\"lastModified\":\"2024-12-12T21:27:58.377\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Una verificaci\u00f3n de los l\u00edmites inadecuada en el firmware APCB puede permitir que un atacante realice una escritura fuera de los l\u00edmites, corrompiendo la entrada APCB y potencialmente llevando a la ejecuci\u00f3n de c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@amd.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"03194384-10A2-4B6D-BED1-C01908249969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF28BE-F049-4716-AADE-643FABB753A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E11A9D-03EC-4014-BB1C-5286C694581B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228E3FBD-F997-402D-AE96-B14D66390700\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"1D532BCD-50E7-41AC-91D3-A0135F2266EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE1C3A6-06F5-4448-B7BE-54EED3672BBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"6CC0AC2E-CA16-46E5-A703-8DCD3EF82425\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"3770F180-FB7C-410F-B49D-D30AA05326BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2EC993-8A65-416B-939F-1C707D596AF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"15FE9FAE-DEC6-42FA-8622-3D5B0C845928\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C6F103-30CC-4738-B489-B12790836B1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"E25EF8F6-B5F3-478C-9AB5-60B29497D2F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9921AE2D-F497-47C8-B463-947E230CF4F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"FD8FA542-D8A5-4C7F-BF80-E79CE90D7D76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C29793-1142-4506-8C32-3B89227BB3A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"F6F0F843-A668-4BA3-9111-491BD115E0DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8921CB70-EE2E-4E18-8E6C-52B505E2D2E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"420E8314-35B8-4A12-AD42-3914EBA51D4D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0FB0AF-E942-4257-A9F2-8077A753A169\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD375C2E-B976-4DAE-BF89-EFED1482DB28\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE68ECE-5298-4BC1-AC24-5CF613389CDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D689C088-F1F1-4368-B6AE-75D3F9582FB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09DC414-96EE-478E-847C-7ACB5915659B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52DFA8C8-AD16-45B1-934F-AEE78C51DDAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F521757-7ABC-4CEB-AD06-2FD738216E8E\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.