An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory |
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 - Vendor Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
23 Nov 2022, 13:59
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | (MISC) https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 - Vendor Advisory | |
CPE | cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:* cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:* cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:* |
09 Nov 2022, 21:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-09 21:15
Updated : 2024-11-21 05:56
NVD link : CVE-2021-26360
Mitre link : CVE-2021-26360
CVE.ORG link : CVE-2021-26360
JSON object : View
Products Affected
amd
- radeon_rx_6700m
- radeon_rx_6850m_xt
- radeon_pro_w6800x
- radeon_pro_w6800
- radeon_rx_6700_xt
- radeon_pro_w6400
- radeon_pro_w6600x
- radeon_rx_6700s
- radeon_software
- radeon_pro_w6600m
- radeon_rx_6600_xt
- radeon_rx_6800_xt
- radeon_rx_6650_xt
- radeon_rx_6750_xt
- radeon_pro_w6800x_duo
- radeon_rx_6800m
- radeon_rx_6400
- radeon_rx_6600
- radeon_rx_6900_xt
- radeon_rx_6500m
- radeon_rx_6300m
- enterprise_driver
- radeon_rx_6700
- radeon_rx_6950_xt
- radeon_rx_6800s
- radeon_pro_w6300m
- radeon_pro_w6600
- radeon_pro_w6500m
- radeon_rx_6650m
- radeon_rx_6800
- radeon_pro_software
- radeon_pro_w6900x
- radeon_rx_6600s
- radeon_rx_6600m
- radeon_rx_6500_xt
- radeon_rx_6650m_xt
CWE