fkie_cve-2023-20598
Vulnerability from fkie_nvd
Published
2023-10-17 14:15
Modified
2024-11-21 07:41
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "7162DB91-6B5C-4575-A8D0-B83B34908BE5", versionEndExcluding: "23.9.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", matchCriteriaId: "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "6289D311-1997-47E7-B8D9-75C27CD0B9D1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", matchCriteriaId: "02AA337B-595F-4859-A82A-DEC7BB346773", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "F08BE928-65AA-4E21-A8F0-D013C8FFB693", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", matchCriteriaId: "A1952152-A184-4FC9-B1CC-008B8238B5ED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", matchCriteriaId: "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "D51EA58C-3684-4567-A213-9351F2E521B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", matchCriteriaId: "D0026781-F1DA-4533-870E-BCA14CFC7005", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9BB84A38-F651-44CB-93EF-502F1A197FBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", matchCriteriaId: "4CEDC946-3685-4533-8D97-BDBDFB7AACBA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "6C66880A-FB33-477D-93FD-C280A4547D66", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*", matchCriteriaId: "2CD3F898-5AB1-4E60-A086-ADCF33820154", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*", matchCriteriaId: "863770A0-3A7F-43E3-98E5-77E42827FA6B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*", matchCriteriaId: "E4FED1D5-F31A-44C9-9101-D70486CC6FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*", matchCriteriaId: "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*", matchCriteriaId: "E2D1C027-56B1-4EA7-842B-09B300B17808", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*", matchCriteriaId: "4C24DE61-4036-42BF-A08F-67C234706703", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "03D9040F-1D1D-49E5-A60E-4393F5D76B60", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*", matchCriteriaId: "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*", matchCriteriaId: "33DAF63F-C468-438C-97C3-B6CE8BD12858", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*", matchCriteriaId: "FD80D674-1DD4-44E0-8C38-8341A7F392B1", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "10DD7029-9299-4901-A3D1-84D6102471B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*", matchCriteriaId: "7F73C59A-CDE2-4203-921F-1831D4ACFD2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "C980129B-D717-47F7-A6C1-5EB64FB1BF9A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*", matchCriteriaId: "B76C585C-FCC8-456D-A63C-7A769AF5EB07", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*", matchCriteriaId: "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*", matchCriteriaId: "2BB37AAC-3957-4840-B47E-ED678F0B6044", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1DA067-DE94-4663-91CD-A70CC386D45A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "9466279D-0582-464E-AFCC-20872CC99B56", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", matchCriteriaId: "12EF0B24-689D-4BE8-98D5-D88A84D5E473", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*", matchCriteriaId: "F14D5A16-F7BE-427A-98AB-2E120DB756DC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "BFC4A007-BEFD-4BF0-A176-7ECD6150041C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "838BCF03-8959-4B8F-96B2-416B880F33DE", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*", matchCriteriaId: "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "33D5FFA6-9D23-4C95-B23D-F50EB60369CA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "730BD289-75E3-4365-A0C1-D0AD1498F3C2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*", matchCriteriaId: "92A2E6B9-ADFB-4790-917B-9679CFE280E3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*", matchCriteriaId: "7F6B0E69-D944-48CF-A3F3-EA350C1451AF", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*", matchCriteriaId: "4EDBF76B-3C2E-4421-800B-54CE6A997439", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*", matchCriteriaId: "72B69860-0C6F-40AD-8696-6150365D908F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*", matchCriteriaId: "9BFE5253-2401-4EE4-90E7-9459F2A93CF1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "2841E9B4-728C-4201-AAF1-3250A1DC08F3", versionEndExcluding: "23.q4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*", matchCriteriaId: "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*", matchCriteriaId: "E39052CC-CC5F-4782-9CCE-2F5C8342AD79", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*", matchCriteriaId: "85E68F7E-0A57-498A-9DB9-3D36045D671E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*", matchCriteriaId: "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*", matchCriteriaId: "7557738A-5D93-4117-8FF2-9A27CD0E6BC5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", matchCriteriaId: "1ED51D4C-2C19-4C3B-814C-3F88AF25870C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", matchCriteriaId: "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*", matchCriteriaId: "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*", matchCriteriaId: "CFF5CD86-64D3-4F02-9971-AC50E8052986", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*", matchCriteriaId: "7162DB91-6B5C-4575-A8D0-B83B34908BE5", versionEndExcluding: "23.9.2", vulnerable: true, }, { criteria: "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*", matchCriteriaId: "2841E9B4-728C-4201-AAF1-3250A1DC08F3", versionEndExcluding: "23.q4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*", matchCriteriaId: "48F04B9F-8C65-476B-B5D8-18CC96E3B712", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", matchCriteriaId: "495E436C-B0EE-4B72-AB49-332F4752C140", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", matchCriteriaId: "1C4FDE72-050C-4A72-A4F4-9C1D5273CADD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", matchCriteriaId: "7D260012-5D8F-4B36-8B88-82DB0291EE9D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", matchCriteriaId: "025E494E-953E-426E-BE89-6F2360A3AAC4", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", matchCriteriaId: "1232B034-1214-4F9A-823D-DC76D5C5956B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*", matchCriteriaId: "0870FBE4-92B4-4717-88B0-EC1094268034", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", matchCriteriaId: "EE36D471-57BF-4385-A825-029F7313E4DB", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", matchCriteriaId: "082BE536-F29C-4A73-B030-A19DD3A448B3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*", matchCriteriaId: "36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", matchCriteriaId: "6740A06F-4512-427D-9CB9-A4A6DB046BA3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", matchCriteriaId: "6C05D51F-469D-487D-9FC8-E1AD699A6F74", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", matchCriteriaId: "BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*", matchCriteriaId: "9BC5E111-A7AA-4A45-A2E3-47013F9135D4", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5D5B25-F32A-493E-BD54-57098981E15A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", matchCriteriaId: "0E3657C6-1047-4CA9-8D44-C7143F7D877D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*", matchCriteriaId: "D2787C72-42D5-42B0-BE5B-E548B319BCF4", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", matchCriteriaId: "09B085FF-EAEA-42BC-BA60-3AA9B76141B9", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", matchCriteriaId: "760F20CC-9034-462C-A25E-C009E2218C38", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", matchCriteriaId: "1D2CBCEA-AB4F-444C-9CCD-A976003F796C", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", matchCriteriaId: "76121981-8DC2-4779-833E-4B15CFCF7FC3", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", matchCriteriaId: "225E8405-04FF-4885-92C8-8581ACC66E06", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", matchCriteriaId: "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", matchCriteriaId: "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", matchCriteriaId: "5D50E8EA-ECB2-463D-BA51-D13CF5A02266", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", matchCriteriaId: "69289284-2ED2-4D8B-8AE2-B835AAF31EAD", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6CD984-A8C7-4B23-8FF9-896C503EBA37", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", matchCriteriaId: "D2D0429F-F186-4F78-9AE0-574E3A39926D", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*", matchCriteriaId: "E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", matchCriteriaId: "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", matchCriteriaId: "8480A7E0-882C-4B03-ADBC-697304B0B7C5", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", matchCriteriaId: "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", matchCriteriaId: "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", matchCriteriaId: "B21FB338-F944-40F9-8F0C-99B471AAD51E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", matchCriteriaId: "3674D656-9623-4B39-AADE-158FE70FF29F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", matchCriteriaId: "BD27234D-ACFC-4144-8980-2B706822C579", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", matchCriteriaId: "5602B902-9FDB-4946-BE4C-236262285F2F", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", matchCriteriaId: "AA666DF3-C5F3-4127-A8EE-B784DD41F642", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "86CAA682-9666-4929-B1AC-D9DB3109DB1A", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*", matchCriteriaId: "5A7E6806-A7AC-4C96-960B-B8934CEA2439", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", matchCriteriaId: "74DD4A40-B712-4B54-9CC7-0BFD79E917BA", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", matchCriteriaId: "82CCEE11-392D-4486-A6AD-CB64FB8B7081", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", matchCriteriaId: "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", matchCriteriaId: "F05C8669-6348-4A1B-B1D4-D22022E1F67E", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*", matchCriteriaId: "018A02C9-2A5C-43E2-8CCD-4D03C119C22B", vulnerable: false, }, { criteria: "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*", matchCriteriaId: "B3DE32CA-168F-4812-AEAE-D771EB01E15D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "\n\n\nAn improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n", }, { lang: "es", value: "Una gestión de privilegios inadecuada en el controlador de gráficos AMD Radeon™ puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones físicas arbitrarias, lo que resulta en una posible ejecución de código arbitrario.", }, ], id: "CVE-2023-20598", lastModified: "2024-11-21T07:41:12.177", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2023-10-17T14:15:09.813", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-269", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.