cve-2021-46755
Vulnerability from cvelistv5
Published
2023-05-09 19:00
Modified
2025-01-28 15:39
Summary
Failure to unmap certain SysHub mappings in error paths of the ASP (AMD Secure Processor) bootloader may allow an attacker with a malicious bootloader to exhaust the SysHub resources resulting in a potential denial of service.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T05:17:42.829Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 7.5,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2021-46755",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-28T15:39:28.433585Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        description: "CWE-noinfo Not enough information",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-28T15:39:32.696Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 3000 Series Desktop Processors “Matisse” AM4",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics  “Cezanne” AM4",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ Threadripper™ PRO Processors “Chagall” WS",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” ",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               packageName: "AGESA",
               platforms: [
                  "x86",
               ],
               product: "Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne”",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
         ],
         datePublic: "2023-05-09T16:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Failure to unmap certain SysHub mappings in\nerror paths of the ASP (AMD Secure Processor) bootloader may allow an attacker\nwith a malicious bootloader to exhaust the SysHub resources resulting in a\npotential denial of service.\n\n\n\n<br>",
                  },
               ],
               value: "Failure to unmap certain SysHub mappings in\nerror paths of the ASP (AMD Secure Processor) bootloader may allow an attacker\nwith a malicious bootloader to exhaust the SysHub resources resulting in a\npotential denial of service.\n\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-09T19:00:26.747Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001",
            },
         ],
         source: {
            advisory: "AMD-SB-4001",
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2021-46755",
      datePublished: "2023-05-09T19:00:26.747Z",
      dateReserved: "2022-03-31T16:50:27.868Z",
      dateUpdated: "2025-01-28T15:39:32.696Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2021-46755\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2023-05-09T20:15:12.157\",\"lastModified\":\"2025-01-28T16:15:31.403\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Failure to unmap certain SysHub mappings in\\nerror paths of the ASP (AMD Secure Processor) bootloader may allow an attacker\\nwith a malicious bootloader to exhaust the SysHub resources resulting in a\\npotential denial of service.\\n\\n\\n\\n\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5500_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F914807-9CD2-4AC2-AC80-6D51ECCDD2C2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB24DB1-A6E6-4628-B35E-08F2AD2775C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5500_firmware:comboam4v2_pi_1.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C4E9FB-C8DE-4B4D-82A1-094CB76F3E57\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB24DB1-A6E6-4628-B35E-08F2AD2775C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E1E4A66-916F-4CAC-A825-3822891DAD42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC9F829-1987-48BD-B77D-CF2DCFA0EB63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600_firmware:comboam4v2_pi_1.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB9B2EB3-A7D8-4142-801E-29936A8D0225\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC9F829-1987-48BD-B77D-CF2DCFA0EB63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600g_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0435F22-C17D-4C3C-9556-2CEBD6BB7CD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8937FABB-B60E-4780-BB6D-B1B99DD69219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600g_firmware:comboam4v2_pi_1.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C32BBD11-EE8D-43A9-A72C-C6BA0DF3EB67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8937FABB-B60E-4780-BB6D-B1B99DD69219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2AC685-547D-463B-B3D3-3ACF0AE4AEE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600x_firmware:comboam4v2_pi_1.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D03090-84AC-4DBB-809B-0F56DA2E3E87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5700g_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6C16607-51DA-4B8E-8DC6-3F6DC127D8B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5700g_firmware:comboam4v2_pi_1.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65B579D0-A3D9-4ABD-A01E-3FAD26D56459\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5700x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA683306-5136-4FA8-9E40-C58929E23162\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B2FC8D5-A4CC-433F-AC14-D2EF1971A36E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5700x_firmware:comboam4v2_pi_1.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7B32426-6549-4285-B787-4F6F147E8BDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B2FC8D5-A4CC-433F-AC14-D2EF1971A36E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5800x3d_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87EAB520-34E7-4A67-807B-7ACD450E5C4D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238EA54F-4809-4D8F-9F18-71135FED9D05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5800x3d_firmware:comboam4v2_pi_1.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C9A4A7-DA30-43C3-A5AF-0899F18E84FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238EA54F-4809-4D8F-9F18-71135FED9D05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5800x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C537F0EB-FA32-4F6E-B27E-74344E566CF7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F6B331-4C0F-49FF-A39F-381B9ADE3483\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5800x_firmware:comboam4v2_pi_1.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23860B42-4D9A-4F8D-B92E-D013707966C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F6B331-4C0F-49FF-A39F-381B9ADE3483\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5900x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C8CAC8-227D-4E4F-9850-361D725A0C8E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"050C802C-D8C7-4D58-BA6E-AC48EEF25215\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5900x_firmware:comboam4v2_pi_1.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D29AA1-A317-43DF-B2D9-B9D97256FB91\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"050C802C-D8C7-4D58-BA6E-AC48EEF25215\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5950x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85E19A52-F4A8-4F88-B1A3-1D585F78785B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD9478CC-DF88-4833-BBB2-2D82D9BBFA63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5950x_firmware:comboam4v2_pi_1.2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAD75B84-03A9-4A0F-B1D0-91395E45DAF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD9478CC-DF88-4833-BBB2-2D82D9BBFA63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"793D1F16-70AB-438D-AC4F-9F26D470405C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C015E367-8E68-40F0-B1AF-7C61C98E8C73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82432C6B-2A98-4884-B1B3-912998BCC721\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C015E367-8E68-40F0-B1AF-7C61C98E8C73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EBD3B7F-8F78-48FA-B2EC-877CD6926961\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F0D6F72-608C-4EE5-B666-69418CF56D85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28B131DD-812D-4B15-A12E-5F2AC87BC132\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F0D6F72-608C-4EE5-B666-69418CF56D85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD124869-67FC-4316-8C13-5756F33265A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"286BEE93-D87A-4715-AECE-088DAE7AA50F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD68B857-969C-42E5-B663-E1A14A8C0F2F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"286BEE93-D87A-4715-AECE-088DAE7AA50F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F15637A5-B898-4AA8-B67F-A26571C9572D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABCE38CA-AC74-44AA-91F3-9031EB3BFEE3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2461496A-4C9D-4F09-9031-7780B4D9060B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABCE38CA-AC74-44AA-91F3-9031EB3BFEE3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AB3F936-8613-4B25-A34B-8FAFEE1AE3BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"881E03BE-79B7-407D-A258-71387A2F78F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE48C033-B6FF-4CAA-82D2-1266C268631A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"881E03BE-79B7-407D-A258-71387A2F78F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F3C9E4F-A7C1-4A54-821F-167CBA7E5C27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5BFE12C-60BF-48D1-A580-8ED687C9FD64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07860820-0BEC-4E77-80A4-212808C388FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5BFE12C-60BF-48D1-A580-8ED687C9FD64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3E2CC9-AE1B-46E4-9DA1-16DF6BFB2DB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1696132C-054B-4263-A34E-069DA28F0FE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7442CCB-01C8-4EC4-90DA-F653001A2044\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1696132C-054B-4263-A34E-069DA28F0FE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6F245FD-75C1-4941-9922-DA93F7981BC3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79160DBB-1801-4A42-A37F-873CDFBC87D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0729C73A-AFF9-483D-8668-9AFD28FF4E01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79160DBB-1801-4A42-A37F-873CDFBC87D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1361CC1A-CB29-4001-9EBF-48A8FFC2463E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4ED8D4C-BDA3-4278-B288-6B4599821F31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0491027-9353-43C1-927C-9E24674AE2CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4ED8D4C-BDA3-4278-B288-6B4599821F31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D53F60-E6DC-4324-BAD4-4DB611BF0B64\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"551D58F2-4CCB-498D-854A-0536EAFCFF96\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"153A32ED-0E61-40EC-A48B-5A0872D4D771\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"551D58F2-4CCB-498D-854A-0536EAFCFF96\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E56DE39-A685-4CC6-BFBD-356E1B5D112C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE379C7-EE6F-46F7-A787-26EB7343D733\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70765D1-E9C5-478E-8514-ED186ADCCFDD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE379C7-EE6F-46F7-A787-26EB7343D733\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18E2AD98-4331-439B-8B96-43EB69A3493D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB763AD-4D9C-44AA-90A3-225E579FF1A2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71726BA2-DA3A-4B39-9CB5-F2B1E2112F4E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB763AD-4D9C-44AA-90A3-225E579FF1A2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4_v2_pi_1.2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"080B373B-49A1-48F7-81CD-1CC6C53EB7E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"560E511C-5D2C-4DEE-B955-FA21F310CA0B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C74B15-7443-4E43-ADC7-726AAFEABF48\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"560E511C-5D2C-4DEE-B955-FA21F310CA0B\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
      vulnrichment: {
         containers: "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"packageName\": \"AGESA\", \"platforms\": [\"x86\"], \"product\": \"Ryzen\\u2122 3000 Series Desktop Processors \\u201cMatisse\\u201d AM4\", \"vendor\": \"AMD\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}]}, {\"defaultStatus\": \"unaffected\", \"packageName\": \"AGESA\", \"platforms\": [\"x86\"], \"product\": \"AMD Ryzen\\u2122 5000 Series Desktop Processors \\u201cVermeer\\u201d AM4\", \"vendor\": \"AMD\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}]}, {\"defaultStatus\": \"unaffected\", \"packageName\": \"AGESA\", \"platforms\": [\"x86\"], \"product\": \"Ryzen\\u2122 5000 Series Desktop processor with Radeon\\u2122 Graphics  \\u201cCezanne\\u201d AM4\", \"vendor\": \"AMD\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}]}, {\"defaultStatus\": \"unaffected\", \"packageName\": \"AGESA\", \"platforms\": [\"x86\"], \"product\": \"3rd Gen AMD Ryzen\\u2122 Threadripper\\u2122 Processors \\u201cCastle Peak\\u201d HEDT\", \"vendor\": \"AMD\", \"versions\": [{\"status\": \"affected\", \"version\": \"various\"}]}, {\"defaultStatus\": \"unaffected\", \"packageName\": \"AGESA\", \"platforms\": [\"x86\"], \"product\": \"Ryzen\\u2122 Threadripper\\u2122 PRO Processors \\u201cCastle Peak\\u201d WS\", \"vendor\": \"AMD\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}]}, {\"defaultStatus\": \"unaffected\", \"packageName\": \"AGESA\", \"platforms\": [\"x86\"], \"product\": \"Ryzen\\u2122 Threadripper\\u2122 PRO Processors \\u201cChagall\\u201d WS\", \"vendor\": \"AMD\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}]}, {\"defaultStatus\": \"unaffected\", \"packageName\": \"AGESA\", \"platforms\": [\"x86\"], \"product\": \"Ryzen\\u2122 3000 Series Mobile Processors with Radeon\\u2122 Graphics \\u201cRenoir\\u201d \", \"vendor\": \"AMD\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}]}, {\"defaultStatus\": \"unaffected\", \"packageName\": \"AGESA\", \"platforms\": [\"x86\"], \"product\": \"Ryzen\\u2122 5000 Series Mobile Processors with Radeon\\u2122 Graphics \\u201cLucienne\\u201d\", \"vendor\": \"AMD\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}]}, {\"defaultStatus\": \"unaffected\", \"packageName\": \"AGESA\", \"platforms\": [\"x86\"], \"product\": \"Ryzen\\u2122 5000 Series Mobile processors with Radeon\\u2122 Graphics \\u201cCezanne\\u201d\", \"vendor\": \"AMD\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}]}], \"datePublic\": \"2023-05-09T16:30:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"Failure to unmap certain SysHub mappings in\\nerror paths of the ASP (AMD Secure Processor) bootloader may allow an attacker\\nwith a malicious bootloader to exhaust the SysHub resources resulting in a\\npotential denial of service.\\n\\n\\n\\n<br>\"}], \"value\": \"Failure to unmap certain SysHub mappings in\\nerror paths of the ASP (AMD Secure Processor) bootloader may allow an attacker\\nwith a malicious bootloader to exhaust the SysHub resources resulting in a\\npotential denial of service.\\n\\n\\n\\n\\n\"}], \"providerMetadata\": {\"orgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"shortName\": \"AMD\", \"dateUpdated\": \"2023-05-09T19:00:26.747Z\"}, \"references\": [{\"tags\": [\"vendor-advisory\"], \"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001\"}], \"source\": {\"advisory\": \"AMD-SB-4001\", \"discovery\": \"UNKNOWN\"}, \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:17:42.829Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"tags\": [\"vendor-advisory\", \"x_transferred\"], \"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-46755\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-28T15:39:28.433585Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-28T15:39:22.214Z\"}}]}",
         cveMetadata: "{\"cveId\": \"CVE-2021-46755\", \"assignerOrgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"AMD\", \"dateReserved\": \"2022-03-31T16:50:27.868Z\", \"datePublished\": \"2023-05-09T19:00:26.747Z\", \"dateUpdated\": \"2025-01-28T15:39:32.696Z\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.