Insufficient checking of memory buffer in ASP
Secure OS may allow an attacker with a malicious TA to read/write to the ASP
Secure OS kernel virtual address space potentially leading to privilege
escalation.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
24 Oct 2024, 13:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:amd:ryzen_embedded_5600e_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_5950e_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_v2546_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_r2312_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_5800e_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_v2516_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_5950e:-:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_5900e_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_5800e:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_r2312:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_v2748:-:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_v2748_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_v2718_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_v2718:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_5900e:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_v2516:-:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_r2314_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_5600e:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_v2546:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_r2314:-:*:*:*:*:*:*:* |
|
First Time |
Amd ryzen Embedded V2718 Firmware
Amd ryzen Embedded 5950e Amd ryzen Embedded R2312 Amd ryzen Embedded 5600e Firmware Amd ryzen Embedded 5800e Amd ryzen Embedded V2748 Amd ryzen Embedded R2314 Amd ryzen Embedded V2516 Firmware Amd ryzen Embedded V2546 Amd ryzen Embedded 5900e Firmware Amd ryzen Embedded R2312 Firmware Amd ryzen Embedded V2718 Amd ryzen Embedded 5800e Firmware Amd ryzen Embedded 5600e Amd ryzen Embedded R2314 Firmware Amd Amd ryzen Embedded 5900e Amd ryzen Embedded V2516 Amd ryzen Embedded V2546 Firmware Amd ryzen Embedded V2748 Firmware Amd ryzen Embedded 5950e Firmware |
18 Jun 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space potentially leading to privilege escalation. |
13 Feb 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-13 20:15
Updated : 2024-10-24 13:44
NVD link : CVE-2021-46757
Mitre link : CVE-2021-46757
CVE.ORG link : CVE-2021-46757
JSON object : View
Products Affected
amd
- ryzen_embedded_v2516_firmware
- ryzen_embedded_5800e
- ryzen_embedded_v2718_firmware
- ryzen_embedded_5600e
- ryzen_embedded_r2312
- ryzen_embedded_v2748
- ryzen_embedded_r2312_firmware
- ryzen_embedded_5900e
- ryzen_embedded_r2314
- ryzen_embedded_5900e_firmware
- ryzen_embedded_5950e_firmware
- ryzen_embedded_5800e_firmware
- ryzen_embedded_5950e
- ryzen_embedded_v2516
- ryzen_embedded_v2718
- ryzen_embedded_v2546
- ryzen_embedded_v2748_firmware
- ryzen_embedded_v2546_firmware
- ryzen_embedded_r2314_firmware
- ryzen_embedded_5600e_firmware
CWE