An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
23 Nov 2022, 13:59
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | (MISC) https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 - Vendor Advisory | |
CPE | cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:* cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:* cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:* |
09 Nov 2022, 21:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-09 21:15
Updated : 2024-02-04 22:51
NVD link : CVE-2021-26360
Mitre link : CVE-2021-26360
CVE.ORG link : CVE-2021-26360
JSON object : View
Products Affected
amd
- radeon_pro_w6300m
- radeon_pro_software
- radeon_rx_6500m
- radeon_rx_6650m_xt
- radeon_rx_6750_xt
- enterprise_driver
- radeon_pro_w6800x
- radeon_rx_6800
- radeon_rx_6400
- radeon_rx_6600m
- radeon_rx_6700
- radeon_rx_6700s
- radeon_pro_w6400
- radeon_rx_6700m
- radeon_pro_w6500m
- radeon_rx_6650m
- radeon_rx_6800s
- radeon_rx_6600_xt
- radeon_rx_6300m
- radeon_rx_6600s
- radeon_pro_w6800x_duo
- radeon_rx_6950_xt
- radeon_rx_6500_xt
- radeon_pro_w6600x
- radeon_rx_6900_xt
- radeon_pro_w6900x
- radeon_rx_6700_xt
- radeon_software
- radeon_pro_w6800
- radeon_rx_6600
- radeon_rx_6850m_xt
- radeon_rx_6800m
- radeon_rx_6650_xt
- radeon_pro_w6600
- radeon_rx_6800_xt
- radeon_pro_w6600m
CWE