CVE-2021-46757

Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space potentially leading to privilege escalation.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:amd:ryzen_embedded_5950e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_5950e:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:amd:ryzen_embedded_5900e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_5900e:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:amd:ryzen_embedded_5800e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_5800e:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:amd:ryzen_embedded_5600e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_5600e:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:amd:ryzen_embedded_v2516_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_v2516:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:amd:ryzen_embedded_v2546_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_v2546:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:amd:ryzen_embedded_v2718_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_v2718:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:amd:ryzen_embedded_v2748_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_v2748:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:amd:ryzen_embedded_r2312_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_r2312:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:amd:ryzen_embedded_r2314_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_r2314:-:*:*:*:*:*:*:*

History

24 Oct 2024, 13:44

Type Values Removed Values Added
References () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 - () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:amd:ryzen_embedded_5600e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_embedded_5950e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_embedded_v2546_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_embedded_r2312_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_embedded_5800e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_embedded_v2516_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_5950e:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_embedded_5900e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_5800e:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_r2312:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_v2748:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_embedded_v2748_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_embedded_v2718_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_v2718:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_5900e:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_v2516:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_embedded_r2314_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_5600e:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_v2546:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_embedded_r2314:-:*:*:*:*:*:*:*
First Time Amd ryzen Embedded V2718 Firmware
Amd ryzen Embedded 5950e
Amd ryzen Embedded R2312
Amd ryzen Embedded 5600e Firmware
Amd ryzen Embedded 5800e
Amd ryzen Embedded V2748
Amd ryzen Embedded R2314
Amd ryzen Embedded V2516 Firmware
Amd ryzen Embedded V2546
Amd ryzen Embedded 5900e Firmware
Amd ryzen Embedded R2312 Firmware
Amd ryzen Embedded V2718
Amd ryzen Embedded 5800e Firmware
Amd ryzen Embedded 5600e
Amd ryzen Embedded R2314 Firmware
Amd
Amd ryzen Embedded 5900e
Amd ryzen Embedded V2516
Amd ryzen Embedded V2546 Firmware
Amd ryzen Embedded V2748 Firmware
Amd ryzen Embedded 5950e Firmware

18 Jun 2024, 19:15

Type Values Removed Values Added
Summary (en) Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space potentially leading to privilege escalation. (en) Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space potentially leading to privilege escalation.

13 Feb 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-13 20:15

Updated : 2024-10-24 13:44


NVD link : CVE-2021-46757

Mitre link : CVE-2021-46757

CVE.ORG link : CVE-2021-46757


JSON object : View

Products Affected

amd

  • ryzen_embedded_v2516_firmware
  • ryzen_embedded_5800e
  • ryzen_embedded_v2718_firmware
  • ryzen_embedded_5600e
  • ryzen_embedded_r2312
  • ryzen_embedded_v2748
  • ryzen_embedded_r2312_firmware
  • ryzen_embedded_5900e
  • ryzen_embedded_r2314
  • ryzen_embedded_5900e_firmware
  • ryzen_embedded_5950e_firmware
  • ryzen_embedded_5800e_firmware
  • ryzen_embedded_5950e
  • ryzen_embedded_v2516
  • ryzen_embedded_v2718
  • ryzen_embedded_v2546
  • ryzen_embedded_v2748_firmware
  • ryzen_embedded_v2546_firmware
  • ryzen_embedded_r2314_firmware
  • ryzen_embedded_5600e_firmware