Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-26360

Опубликовано: 09 нояб. 2022
Источник: nvd
CVSS3: 7.8
EPSS Низкий

Описание

An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*
Версия до 22.10.20 (исключая)
cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*
Версия до 22.q2 (исключая)
cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*
Версия до 22.5.2 (исключая)

Одно из

cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*

EPSS

Процентиль: 14%
0.00045
Низкий

7.8 High

CVSS3

Дефекты

NVD-CWE-noinfo
CWE-284

Связанные уязвимости

CVSS3: 6.4
redhat
около 3 лет назад

An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.

CVSS3: 7.8
github
больше 2 лет назад

An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.

EPSS

Процентиль: 14%
0.00045
Низкий

7.8 High

CVSS3

Дефекты

NVD-CWE-noinfo
CWE-284