Insufficient checking of memory buffer in ASP
Secure OS may allow an attacker with a malicious TA to read/write to the ASP
Secure OS kernel virtual address space potentially leading to privilege
escalation.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
24 Oct 2024, 13:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 - Vendor Advisory | |
CPE | cpe:2.3:o:amd:ryzen_embedded_r2312_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_5600e_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_v2516_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_v2748:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_v2546:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_r2314:-:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_v2748_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_v2718:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_5800e:-:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_5900e_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_5900e:-:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_5950e_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_5950e:-:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_5800e_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_r2312:-:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_5600e:-:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_r2314_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:amd:ryzen_embedded_v2516:-:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_v2718_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:amd:ryzen_embedded_v2546_firmware:*:*:*:*:*:*:*:* |
|
First Time |
Amd ryzen Embedded R2314
Amd ryzen Embedded V2748 Amd ryzen Embedded 5600e Amd ryzen Embedded R2312 Firmware Amd ryzen Embedded V2546 Amd ryzen Embedded V2718 Firmware Amd ryzen Embedded 5800e Amd ryzen Embedded 5950e Amd ryzen Embedded 5900e Firmware Amd ryzen Embedded V2516 Firmware Amd ryzen Embedded V2718 Amd ryzen Embedded V2546 Firmware Amd ryzen Embedded 5900e Amd ryzen Embedded V2748 Firmware Amd ryzen Embedded V2516 Amd Amd ryzen Embedded 5600e Firmware Amd ryzen Embedded 5800e Firmware Amd ryzen Embedded R2314 Firmware Amd ryzen Embedded R2312 Amd ryzen Embedded 5950e Firmware |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | NVD-CWE-noinfo |
18 Jun 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space potentially leading to privilege escalation. |
13 Feb 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-13 20:15
Updated : 2024-10-24 13:44
NVD link : CVE-2021-46757
Mitre link : CVE-2021-46757
CVE.ORG link : CVE-2021-46757
JSON object : View
Products Affected
amd
- ryzen_embedded_v2718_firmware
- ryzen_embedded_r2314
- ryzen_embedded_r2312_firmware
- ryzen_embedded_5800e
- ryzen_embedded_r2314_firmware
- ryzen_embedded_5900e_firmware
- ryzen_embedded_5600e
- ryzen_embedded_v2516_firmware
- ryzen_embedded_5900e
- ryzen_embedded_v2516
- ryzen_embedded_5800e_firmware
- ryzen_embedded_v2718
- ryzen_embedded_r2312
- ryzen_embedded_v2546_firmware
- ryzen_embedded_v2546
- ryzen_embedded_v2748_firmware
- ryzen_embedded_v2748
- ryzen_embedded_5600e_firmware
- ryzen_embedded_5950e
- ryzen_embedded_5950e_firmware
CWE