cve-2023-20598
Vulnerability from cvelistv5
Published
2023-10-17 13:26
Modified
2024-08-02 09:05
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "radeon_rx_5300_xt",
                  vendor: "amd",
                  versions: [
                     {
                        lessThanOrEqual: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "ryzen_5_7645hx",
                  vendor: "amd",
                  versions: [
                     {
                        lessThan: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*",
                     "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "ryzen_9_pro_7945",
                  vendor: "amd",
                  versions: [
                     {
                        lessThan: "*",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 7.8,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-20598",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-27T17:12:05.139002Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-269",
                        description: "CWE-269 Improper Privilege Management",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-27T17:12:23.788Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T09:05:36.253Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vendor-advisory",
                     "x_transferred",
                  ],
                  url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ RX 5000 Series Graphics Cards",
               vendor: " AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ RX 6000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ RX 7000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ PRO W5000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "Various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ PRO W6000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Radeon™ PRO W7000 Series Graphics Cards",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Ryzen™ 7045 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: " Ryzen™ 7020 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Ryzen™ 7040 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Ryzen™ 7000 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Ryzen™ 6000 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               platforms: [
                  "Windows",
                  "x86",
               ],
               product: "Ryzen™ 7035 Series Processors with Radeon™ Graphics",
               vendor: "AMD",
               versions: [
                  {
                     status: "affected",
                     version: "various ",
                  },
               ],
            },
         ],
         datePublic: "2023-10-16T17:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "\n\n\n\n<span style=\"background-color: rgb(248, 249, 250);\">An improper privilege management in the AMD Radeon™</span>&nbsp;<span style=\"background-color: rgb(248, 249, 250);\">Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.</span>\n\n\n\n",
                  },
               ],
               value: "\n\n\nAn improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n",
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-10-17T13:26:21.731Z",
            orgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
            shortName: "AMD",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009",
            },
         ],
         source: {
            advisory: "  AMD-SB-6009",
            discovery: "EXTERNAL",
         },
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b58fc414-a1e4-4f92-9d70-1add41838648",
      assignerShortName: "AMD",
      cveId: "CVE-2023-20598",
      datePublished: "2023-10-17T13:26:21.731Z",
      dateReserved: "2022-10-27T18:53:39.763Z",
      dateUpdated: "2024-08-02T09:05:36.253Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2023-20598\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2023-10-17T14:15:09.813\",\"lastModified\":\"2024-11-21T07:41:12.177\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\n\\n\\nAn improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\\n\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Una gestión de privilegios inadecuada en el controlador de gráficos AMD Radeon™ puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones físicas arbitrarias, lo que resulta en una posible ejecución de código arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\",\"versionEndExcluding\":\"23.9.2\",\"matchCriteriaId\":\"7162DB91-6B5C-4575-A8D0-B83B34908BE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9995FBE-D440-45BA-86B5-1CFADF5BEE2B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6289D311-1997-47E7-B8D9-75C27CD0B9D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02AA337B-595F-4859-A82A-DEC7BB346773\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F08BE928-65AA-4E21-A8F0-D013C8FFB693\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1952152-A184-4FC9-B1CC-008B8238B5ED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D51EA58C-3684-4567-A213-9351F2E521B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0026781-F1DA-4533-870E-BCA14CFC7005\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB84A38-F651-44CB-93EF-502F1A197FBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEDC946-3685-4533-8D97-BDBDFB7AACBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C66880A-FB33-477D-93FD-C280A4547D66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD3F898-5AB1-4E60-A086-ADCF33820154\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863770A0-3A7F-43E3-98E5-77E42827FA6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FED1D5-F31A-44C9-9101-D70486CC6FC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB12B48-ABF8-4FFB-BD4E-6413C34D477B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2D1C027-56B1-4EA7-842B-09B300B17808\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C24DE61-4036-42BF-A08F-67C234706703\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D9040F-1D1D-49E5-A60E-4393F5D76B60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A76A792F-7026-4F29-9A00-3A2EAB2DE5FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33DAF63F-C468-438C-97C3-B6CE8BD12858\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82D4745-ACAB-4FC2-A63D-3B0FEA208BED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD80D674-1DD4-44E0-8C38-8341A7F392B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10DD7029-9299-4901-A3D1-84D6102471B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F73C59A-CDE2-4203-921F-1831D4ACFD2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C980129B-D717-47F7-A6C1-5EB64FB1BF9A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76C585C-FCC8-456D-A63C-7A769AF5EB07\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB37AAC-3957-4840-B47E-ED678F0B6044\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA1DA067-DE94-4663-91CD-A70CC386D45A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9466279D-0582-464E-AFCC-20872CC99B56\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12EF0B24-689D-4BE8-98D5-D88A84D5E473\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14D5A16-F7BE-427A-98AB-2E120DB756DC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC4A007-BEFD-4BF0-A176-7ECD6150041C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"838BCF03-8959-4B8F-96B2-416B880F33DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33D5FFA6-9D23-4C95-B23D-F50EB60369CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"730BD289-75E3-4365-A0C1-D0AD1498F3C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A2E6B9-ADFB-4790-917B-9679CFE280E3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"334FD5E4-BA45-42BA-B1EC-0DC1E1F44018\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6B0E69-D944-48CF-A3F3-EA350C1451AF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EDBF76B-3C2E-4421-800B-54CE6A997439\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72B69860-0C6F-40AD-8696-6150365D908F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFE5253-2401-4EE4-90E7-9459F2A93CF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\",\"versionEndExcluding\":\"23.q4\",\"matchCriteriaId\":\"2841E9B4-728C-4201-AAF1-3250A1DC08F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39052CC-CC5F-4782-9CCE-2F5C8342AD79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85E68F7E-0A57-498A-9DB9-3D36045D671E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB91262-2EF4-4F0D-8B61-0012BD25E7A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3083C065-5A2C-4B2D-9C1F-5793BA3C0A52\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7557738A-5D93-4117-8FF2-9A27CD0E6BC5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ED51D4C-2C19-4C3B-814C-3F88AF25870C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98B858C0-0490-4D50-BC1E-FFB5A54E5DBC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF5CD86-64D3-4F02-9971-AC50E8052986\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\",\"versionEndExcluding\":\"23.9.2\",\"matchCriteriaId\":\"7162DB91-6B5C-4575-A8D0-B83B34908BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\",\"versionEndExcluding\":\"23.q4\",\"matchCriteriaId\":\"2841E9B4-728C-4201-AAF1-3250A1DC08F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F04B9F-8C65-476B-B5D8-18CC96E3B712\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"495E436C-B0EE-4B72-AB49-332F4752C140\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C4FDE72-050C-4A72-A4F4-9C1D5273CADD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D260012-5D8F-4B36-8B88-82DB0291EE9D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"025E494E-953E-426E-BE89-6F2360A3AAC4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1232B034-1214-4F9A-823D-DC76D5C5956B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0870FBE4-92B4-4717-88B0-EC1094268034\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE36D471-57BF-4385-A825-029F7313E4DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"082BE536-F29C-4A73-B030-A19DD3A448B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6740A06F-4512-427D-9CB9-A4A6DB046BA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C05D51F-469D-487D-9FC8-E1AD699A6F74\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC5E111-A7AA-4A45-A2E3-47013F9135D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5D5B25-F32A-493E-BD54-57098981E15A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3657C6-1047-4CA9-8D44-C7143F7D877D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2787C72-42D5-42B0-BE5B-E548B319BCF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09B085FF-EAEA-42BC-BA60-3AA9B76141B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"760F20CC-9034-462C-A25E-C009E2218C38\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D2CBCEA-AB4F-444C-9CCD-A976003F796C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76121981-8DC2-4779-833E-4B15CFCF7FC3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225E8405-04FF-4885-92C8-8581ACC66E06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D50E8EA-ECB2-463D-BA51-D13CF5A02266\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69289284-2ED2-4D8B-8AE2-B835AAF31EAD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA6CD984-A8C7-4B23-8FF9-896C503EBA37\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D0429F-F186-4F78-9AE0-574E3A39926D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00DEBFA8-6007-4EAE-AD11-6D477ADE4E63\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8480A7E0-882C-4B03-ADBC-697304B0B7C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA29FE4D-C9A2-46FB-8EC5-3067F56ED080\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B21FB338-F944-40F9-8F0C-99B471AAD51E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3674D656-9623-4B39-AADE-158FE70FF29F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD27234D-ACFC-4144-8980-2B706822C579\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5602B902-9FDB-4946-BE4C-236262285F2F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA666DF3-C5F3-4127-A8EE-B784DD41F642\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86CAA682-9666-4929-B1AC-D9DB3109DB1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A7E6806-A7AC-4C96-960B-B8934CEA2439\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74DD4A40-B712-4B54-9CC7-0BFD79E917BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82CCEE11-392D-4486-A6AD-CB64FB8B7081\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6C7D37-C94B-4301-8C0A-5A00B3569D6E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F05C8669-6348-4A1B-B1D4-D22022E1F67E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"018A02C9-2A5C-43E2-8CCD-4D03C119C22B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3DE32CA-168F-4812-AEAE-D771EB01E15D\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T09:05:36.253Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-20598\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-27T17:12:05.139002Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"radeon_rx_5300_xt\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"*\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_5_7645hx\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*\", \"cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_9_pro_7945\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"*\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269 Improper Privilege Management\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-27T14:50:58.617Z\"}}], \"cna\": {\"source\": {\"advisory\": \"\\u202f\\u202fAMD-SB-6009\", \"discovery\": \"EXTERNAL\"}, \"affected\": [{\"vendor\": \" AMD\", \"product\": \"Radeon\\u2122 RX 5000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"various\"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Radeon\\u2122 RX 6000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Radeon\\u2122 RX 7000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Radeon\\u2122 PRO W5000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"Various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Radeon\\u2122 PRO W6000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Radeon\\u2122 PRO W7000 Series Graphics Cards\", \"versions\": [{\"status\": \"affected\", \"version\": \"various\"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 7045 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \" Ryzen\\u2122 7020 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 7040 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 7000 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 6000 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"Ryzen\\u2122 7035 Series Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various \"}], \"platforms\": [\"Windows\", \"x86\"], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2023-10-16T17:00:00.000Z\", \"references\": [{\"url\": \"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\n\\n\\nAn improper privilege management in the AMD Radeon\\u2122\\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\\n\\n<span style=\\\"background-color: rgb(248, 249, 250);\\\">An improper privilege management in the AMD Radeon\\u2122</span>&nbsp;<span style=\\\"background-color: rgb(248, 249, 250);\\\">Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.</span>\\n\\n\\n\\n\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"shortName\": \"AMD\", \"dateUpdated\": \"2023-10-17T13:26:21.731Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2023-20598\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T09:05:36.253Z\", \"dateReserved\": \"2022-10-27T18:53:39.763Z\", \"assignerOrgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"datePublished\": \"2023-10-17T13:26:21.731Z\", \"assignerShortName\": \"AMD\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.