Vulnerabilites related to amd - radeon_software
cve-2020-12962
Vulnerability from cvelistv5
Published
2021-11-15 19:42
Modified
2024-09-16 22:09
Severity ?
Summary
Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.192Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:42:43",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12962",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12962",
    "datePublished": "2021-11-15T19:42:43.185696Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T22:09:11.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12903
Vulnerability from cvelistv5
Published
2021-11-15 19:44
Modified
2024-09-17 00:52
Severity ?
Summary
Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.704Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:44:12",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12903",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12903",
    "datePublished": "2021-11-15T19:44:12.722388Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T00:52:24.174Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12983
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-17 02:57
Severity ?
Summary
An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.208Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:17:05",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12983",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12983",
    "datePublished": "2021-06-11T21:49:54.656844Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T02:57:33.983Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12899
Vulnerability from cvelistv5
Published
2021-11-15 15:29
Modified
2024-09-16 18:44
Severity ?
Summary
Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:29:56",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12899",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12899",
    "datePublished": "2021-11-15T15:29:56.401647Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T18:44:07.969Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12982
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-17 00:16
Severity ?
Summary
An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.962Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:16:44",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12982",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12982",
    "datePublished": "2021-06-11T21:49:49.547155Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T00:16:16.729Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12892
Vulnerability from cvelistv5
Published
2021-11-15 18:39
Modified
2024-09-16 17:34
Severity ?
Summary
An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 21.3.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.033Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "21.3.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:38",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12892",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "21.3.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12892",
    "datePublished": "2021-11-15T18:39:47.290631Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T17:34:18.633Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-20567
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2025-02-13 16:39
Severity ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.949Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AMD Software: Adrenalin Edition 23.7.1",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AMD Software: PRO Edition 23.Q3",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 RX Vega Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 PRO WX Vega Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-14T18:55:22.270Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
        },
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-6003",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20567",
    "datePublished": "2023-11-14T18:51:25.340Z",
    "dateReserved": "2022-10-27T18:53:39.753Z",
    "dateUpdated": "2025-02-13T16:39:47.219Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12900
Vulnerability from cvelistv5
Published
2021-11-15 15:27
Modified
2024-09-17 02:21
Severity ?
Summary
An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.394Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:27:51",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12900",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12900",
    "datePublished": "2021-11-15T15:27:51.589901Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T02:21:18.348Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26367
Vulnerability from cvelistv5
Published
2024-08-13 16:50
Modified
2024-12-04 16:25
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
Impacted products
Vendor Product Version
AMD AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics Create a notification for this product.
   AMD AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Radeon™ RX 6000 Series Graphics Cards Create a notification for this product.
   AMD AMD Radeon™ PRO W6000 Series Graphics Cards Create a notification for this product.
   AMD AMD Ryzen™ Embedded R1000 Series Processors Create a notification for this product.
   AMD AMD Ryzen™ Embedded R2000 Series Processors Create a notification for this product.
   AMD AMD Ryzen™ Embedded V1000 Series Processors Create a notification for this product.
   AMD AMD Ryzen™ Embedded V2000 Series Processors Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-26367",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-13T18:04:31.680686Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T16:25:09.987Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4PI  1.0.0.9"
            },
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.8"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4v2 PI 1.2.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile  Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PollockPI-FT5  1.0.0.4"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "PicassoPI-FP5  1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RenoirPI-FP6  1.0.0.7"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  Adrenalin Edition 23.12.1 (23.30.13.01)"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  PRO Edition 23.Q4 (23.30.13.03)"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedR2KPI-FP5 1.0.0.2"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP5 1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP6 1.0.0.6"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
            }
          ],
          "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:50:05.825Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
        },
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26367",
    "datePublished": "2024-08-13T16:50:05.825Z",
    "dateReserved": "2021-01-29T21:24:26.151Z",
    "dateUpdated": "2024-12-04T16:25:09.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12901
Vulnerability from cvelistv5
Published
2021-11-15 19:20
Modified
2024-09-17 03:17
Severity ?
Summary
Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.064Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:20:07",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12901",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12901",
    "datePublished": "2021-11-15T19:20:07.896631Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T03:17:36.985Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-46748
Vulnerability from cvelistv5
Published
2023-11-14 18:50
Modified
2025-02-13 16:28
Severity ?
Summary
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.605Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AMD Software: Adrenalin Edition 23.7.1",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AMD Software: PRO Edition 23.Q3",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 RX Vega Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 PRO WX Vega Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-14T18:55:08.336Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
        },
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-6003",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46748",
    "datePublished": "2023-11-14T18:50:52.470Z",
    "dateReserved": "2022-03-31T16:50:27.865Z",
    "dateUpdated": "2025-02-13T16:28:47.934Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12893
Vulnerability from cvelistv5
Published
2021-11-15 19:45
Modified
2024-09-16 23:15
Severity ?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.856Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:45",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12893",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12893",
    "datePublished": "2021-11-15T19:45:36.942420Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T23:15:51.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12929
Vulnerability from cvelistv5
Published
2021-11-15 15:52
Modified
2024-09-17 02:00
Severity ?
Summary
Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution ."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:51",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12929",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution ."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12929",
    "datePublished": "2021-11-15T15:52:18.454932Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T02:00:49.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12986
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-16 16:58
Severity ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.187Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:17:26",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12986",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12986",
    "datePublished": "2021-06-11T21:50:10.654582Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T16:58:08.554Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-21937
Vulnerability from cvelistv5
Published
2024-11-12 17:14
Modified
2024-11-14 16:26
Summary
Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:amd:amd_software_pro_edition:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "amd_software_pro_edition",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "24.10.16",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "24.q2_24.10.20",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:amd_software_adrenalin_edition:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "amd_software_adrenalin_edition",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "24.6.1_24.10.21.01",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:amd_software_cloud_edition:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "amd_software_cloud_edition",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "24.7.1",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-21937",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-14T16:22:23.757990Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-14T16:26:04.560Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "AMD Software: PRO Edition",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "24.10.16",
              "status": "affected",
              "version": "0",
              "versionType": "software"
            },
            {
              "lessThan": "24.Q2 (24.10.20)",
              "status": "affected",
              "version": "0",
              "versionType": "software"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Software: Adrenalin Edition",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "24.6.1 (24.10.21.01)",
              "status": "affected",
              "version": "0",
              "versionType": "software"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Software: Cloud Edition",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "24.7.1",
              "status": "affected",
              "version": "0",
              "versionType": "software"
            }
          ]
        }
      ],
      "datePublic": "2024-11-12T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eIncorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.\u003c/span\u003e"
            }
          ],
          "value": "Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-12T17:14:20.641Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6015.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2024-21937",
    "datePublished": "2024-11-12T17:14:20.641Z",
    "dateReserved": "2024-01-03T16:43:14.977Z",
    "dateUpdated": "2024-11-14T16:26:04.560Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26360
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 22:56
Severity ?
Summary
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 6000 Series & PRO W6000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.015Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "22.5.2",
              "status": "affected",
              "version": "AMD Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "22.Q2",
              "status": "affected",
              "version": "AMD Radeon Pro Software Enterprise",
              "versionType": "custom"
            },
            {
              "lessThan": "22.10.20",
              "status": "affected",
              "version": "Enterprise Driver",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-11-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor\u2019s encrypted memory contents which may lead to arbitrary code execution in ASP."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "TBD",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-09T00:00:00",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1029",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26360",
    "datePublished": "2022-11-09T20:44:26.034287Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T22:56:17.356Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12931
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-17 00:56
Severity ?
Summary
Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 5000 Series & PRO W5000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
Create a notification for this product.
   AMD AMD Ryzen(TM) Embedded R1000 Version: various
Create a notification for this product.
   AMD AMD Ryzen(TM) Embedded R2000 Version: various
Create a notification for this product.
   AMD AMD Ryzen(TM) Embedded 5000 Version: various
Create a notification for this product.
   AMD AMD Ryzen(TM) Embedded V1000 Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.233Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "22.5.2",
              "status": "affected",
              "version": "AMD Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "22.Q2",
              "status": "affected",
              "version": "AMD Radeon Pro Software Enterprise",
              "versionType": "custom"
            },
            {
              "lessThan": "22.10.20",
              "status": "affected",
              "version": "Enterprise Driver",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen(TM) Embedded R1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen(TM) Embedded R2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen(TM) Embedded 5000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen(TM) Embedded V1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-11-08T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eImproper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.\u003c/p\u003e"
            }
          ],
          "value": "Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-13T19:20:36.423Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
        },
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1029, AMD-SB-5001",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12931",
    "datePublished": "2022-11-09T20:44:24.974055Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T00:56:08.624Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-20598
Vulnerability from cvelistv5
Published
2023-10-17 13:26
Modified
2024-08-02 09:05
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "radeon_rx_5300_xt",
            "vendor": "amd",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_pro_7840h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7545u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_5_7645hx",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_pro_7940h:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*",
              "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_9_pro_7945",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20598",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-27T17:12:05.139002Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-269",
                "description": "CWE-269 Improper Privilege Management",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-27T17:12:23.788Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.253Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 RX 5000 Series Graphics Cards",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 RX 6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 RX 7000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 PRO W5000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 PRO W6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Radeon\u2122 PRO W7000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Ryzen\u2122 7045 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": " Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Ryzen\u2122 7040 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Ryzen\u2122 7000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "Windows",
            "x86"
          ],
          "product": "Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-10-16T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\n\n\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eAn improper privilege management in the AMD Radeon\u2122\u003c/span\u003e\u0026nbsp;\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eGraphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\u003c/span\u003e\n\n\n\n"
            }
          ],
          "value": "\n\n\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T13:26:21.731Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009"
        }
      ],
      "source": {
        "advisory": "\u202f\u202fAMD-SB-6009",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20598",
    "datePublished": "2023-10-17T13:26:21.731Z",
    "dateReserved": "2022-10-27T18:53:39.763Z",
    "dateUpdated": "2024-08-02T09:05:36.253Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12904
Vulnerability from cvelistv5
Published
2021-11-15 15:12
Modified
2024-09-16 16:38
Severity ?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.111Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:12:44",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12904",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12904",
    "datePublished": "2021-11-15T15:12:44.714023Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T16:38:11.800Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12905
Vulnerability from cvelistv5
Published
2021-11-15 19:40
Modified
2024-09-17 00:36
Severity ?
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.090Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:40:02",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12905",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12905",
    "datePublished": "2021-11-15T19:40:02.588599Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T00:36:22.821Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26362
Vulnerability from cvelistv5
Published
2022-05-12 17:43
Modified
2024-09-16 19:41
Severity ?
Summary
A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.904Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T17:43:15",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26362",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26362",
    "datePublished": "2022-05-12T17:43:15.598731Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T19:41:16.010Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26317
Vulnerability from cvelistv5
Published
2022-05-12 18:27
Modified
2024-09-17 01:10
Severity ?
Summary
Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.472Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T18:27:48",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26317",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26317",
    "datePublished": "2022-05-12T18:27:48.589066Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T01:10:36.785Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-20568
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2025-02-13 16:39
Severity ?
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.255Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AMD Software: Adrenalin Edition 23.7.1",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AMD Software: PRO Edition 23.Q3",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 RX Vega Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 PRO WX Vega Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-14T18:55:23.226Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
        },
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-6003",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20568",
    "datePublished": "2023-11-14T18:51:35.466Z",
    "dateReserved": "2022-10-27T18:53:39.754Z",
    "dateUpdated": "2025-02-13T16:39:47.747Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26361
Vulnerability from cvelistv5
Published
2022-05-12 17:46
Modified
2024-09-17 01:06
Severity ?
Summary
A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.531Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T17:46:01",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26361",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26361",
    "datePublished": "2022-05-12T17:46:01.990877Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T01:06:56.408Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12985
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-16 17:23
Severity ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.044Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:16:33",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12985",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12985",
    "datePublished": "2021-06-11T21:50:05.196288Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T17:23:19.728Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-20510
Vulnerability from cvelistv5
Published
2024-08-13 16:52
Modified
2024-11-21 15:32
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 4.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20510",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-13T18:03:49.594825Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T15:32:34.695Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  Adrenalin Edition 23.12.1 (23.30.13.01)"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  PRO Edition 23.Q4 (23.30.13.03)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service."
            }
          ],
          "value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:52:11.777Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20510",
    "datePublished": "2024-08-13T16:52:11.777Z",
    "dateReserved": "2022-10-27T18:53:39.735Z",
    "dateUpdated": "2024-11-21T15:32:34.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26392
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 20:51
Severity ?
Summary
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 5000 Series & PRO W5000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
Create a notification for this product.
   AMD AMD Radeon RX 6000 Series & PRO W6000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
Create a notification for this product.
   AMD AMD Ryzen™ Embedded R1000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded R2000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded 5000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded V1000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded V2000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™Embedded V3000 Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.366Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "22.5.2",
              "status": "affected",
              "version": "AMD Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "22.Q2",
              "status": "affected",
              "version": "AMD Radeon Pro Software Enterprise",
              "versionType": "custom"
            },
            {
              "lessThan": "22.10.20",
              "status": "affected",
              "version": "Enterprise Driver",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "22.5.2",
              "status": "affected",
              "version": "AMD Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "22.Q2",
              "status": "affected",
              "version": "AMD Radeon Pro Software Enterprise",
              "versionType": "custom"
            },
            {
              "lessThan": "22.10.20",
              "status": "affected",
              "version": "Enterprise Driver",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded R1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded R2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded 5000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded V1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded V2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122Embedded V3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-11-08T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eInsufficient verification of missing size check in \u0027LoadModule\u0027 may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.\u003c/p\u003e"
            }
          ],
          "value": "Insufficient verification of missing size check in \u0027LoadModule\u0027 may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-13T19:22:08.137Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
        },
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1029, AMD-SB-5001",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26392",
    "datePublished": "2022-11-09T20:44:26.258839Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T20:51:46.791Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26393
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 21:58
Severity ?
Summary
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 5000 Series & PRO W5000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
Create a notification for this product.
   AMD AMD Radeon RX 6000 Series & PRO W6000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
Create a notification for this product.
   AMD AMD Ryzen™ Embedded R1000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded R2000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded V1000 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded V2000 Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.406Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "22.5.2",
              "status": "affected",
              "version": "AMD Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "22.Q2",
              "status": "affected",
              "version": "AMD Radeon Pro Software Enterprise",
              "versionType": "custom"
            },
            {
              "lessThan": "22.10.20",
              "status": "affected",
              "version": "Enterprise Driver",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "22.5.2",
              "status": "affected",
              "version": "AMD Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "22.Q2",
              "status": "affected",
              "version": "AMD Radeon Pro Software Enterprise",
              "versionType": "custom"
            },
            {
              "lessThan": "22.10.20",
              "status": "affected",
              "version": "Enterprise Driver",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded R1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded R2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded V1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded V2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-11-08T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eInsufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.\u003c/p\u003e"
            }
          ],
          "value": "Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-13T19:22:50.269Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
        },
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1029, AMD-SB-5001",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26393",
    "datePublished": "2022-11-09T20:44:25.517806Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T21:58:26.137Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26366
Vulnerability from cvelistv5
Published
2022-05-12 17:09
Modified
2024-09-17 01:51
Severity ?
Summary
An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.139Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T17:09:29",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26366",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26366",
    "datePublished": "2022-05-12T17:09:29.825927Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T01:51:13.541Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-20586
Vulnerability from cvelistv5
Published
2023-08-08 17:05
Modified
2024-10-11 16:52
Severity ?
Summary
A potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.256Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20586",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-11T16:52:02.725525Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-11T16:52:31.173Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 Software Crimson ReLive Edition",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        }
      ],
      "datePublic": "2023-08-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA potential vulnerability was reported in \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eRadeon\u2122 Software Crimson ReLive Edition\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e which may allow escalation of privilege. \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eRadeon\u2122 Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations\u003c/span\u003e\n\n\n\n\n\n\u003c/span\u003e\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "\nA potential vulnerability was reported in Radeon\u2122 Software Crimson ReLive Edition which may allow escalation of privilege. Radeon\u2122 Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-08T17:05:16.338Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007"
        }
      ],
      "source": {
        "advisory": "AMD-SB-6007",
        "discovery": "UNKNOWN"
      },
      "title": "Radeon\u2122 Software Crimson ReLive Edition",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20586",
    "datePublished": "2023-08-08T17:05:16.338Z",
    "dateReserved": "2022-10-27T18:53:39.759Z",
    "dateUpdated": "2024-10-11T16:52:31.173Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12987
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-17 01:02
Severity ?
Summary
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.199Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:17:38",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12987",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12987",
    "datePublished": "2021-06-11T21:50:16.210991Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T01:02:07.506Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12897
Vulnerability from cvelistv5
Published
2021-11-15 15:44
Modified
2024-09-16 17:38
Severity ?
Summary
Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 21.3.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.036Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "21.3.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:44:11",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12897",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "21.3.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12897",
    "datePublished": "2021-11-15T15:44:11.456371Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T17:38:45.112Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12930
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-17 00:00
Severity ?
Summary
Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.208Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "22.5.2",
              "status": "affected",
              "version": "AMD Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "22.Q2",
              "status": "affected",
              "version": "AMD Radeon Pro Software Enterprise",
              "versionType": "custom"
            },
            {
              "lessThan": "22.10.20",
              "status": "affected",
              "version": "Enterprise Driver",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen(TM) Embedded R1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen(TM) Embedded R2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen(TM) Embedded 5000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen(TM) Embedded V1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen(TM) Embedded V2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-11-08T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eImproper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.\u003c/p\u003e"
            }
          ],
          "value": "Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-13T19:20:09.393Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
        },
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1029, AMD-SB-5001",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12930",
    "datePublished": "2022-11-09T20:44:25.791003Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T00:00:30.267Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-31320
Vulnerability from cvelistv5
Published
2023-11-14 18:51
Modified
2024-08-02 14:53
Severity ?
Summary
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:30.757Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AMD Software: Adrenalin Edition 23.7.1 ",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 RX 5000/6000/7000 Series Graphics Cards ",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AMD Software: PRO Edition 23.Q3 ",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 PRO W5000/W6000/W7000 Series Graphics Cards",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 RX Vega Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "x86"
          ],
          "product": "Radeon\u2122 PRO WX Vega Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-14T18:51:43.415Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
        }
      ],
      "source": {
        "advisory": "AMD-SB-6003",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-31320",
    "datePublished": "2023-11-14T18:51:43.415Z",
    "dateReserved": "2023-04-27T15:25:41.423Z",
    "dateUpdated": "2024-08-02T14:53:30.757Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26391
Vulnerability from cvelistv5
Published
2022-11-09 20:44
Modified
2024-09-16 17:33
Severity ?
Summary
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
Impacted products
Vendor Product Version
AMD AMD Radeon RX 5000 Series & PRO W5000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
Create a notification for this product.
   AMD AMD Radeon RX 6000 Series & PRO W6000 Series Version: AMD Radeon Software   < 22.5.2
Version: AMD Radeon Pro Software Enterprise   < 22.Q2
Version: Enterprise Driver   < 22.10.20
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.325Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon RX 5000 Series \u0026 PRO W5000 Series",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "22.5.2",
              "status": "affected",
              "version": "AMD Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "22.Q2",
              "status": "affected",
              "version": "AMD Radeon Pro Software Enterprise",
              "versionType": "custom"
            },
            {
              "lessThan": "22.10.20",
              "status": "affected",
              "version": "Enterprise Driver",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "AMD Radeon RX 6000 Series \u0026 PRO W6000 Series",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "22.5.2",
              "status": "affected",
              "version": "AMD Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "22.Q2",
              "status": "affected",
              "version": "AMD Radeon Pro Software Enterprise",
              "versionType": "custom"
            },
            {
              "lessThan": "22.10.20",
              "status": "affected",
              "version": "Enterprise Driver",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-11-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "TBD",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-09T00:00:00",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1029",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26391",
    "datePublished": "2022-11-09T20:44:25.253369Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T17:33:16.199Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12891
Vulnerability from cvelistv5
Published
2022-02-04 22:29
Modified
2024-09-16 17:33
Severity ?
Summary
AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.
Impacted products
Vendor Product Version
AMD Radeon Software Version: Radeon Driver   < 21.4.1
Create a notification for this product.
   AMD Radeon Pro Software for Enterprise Version: Enterprise Driver   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.664Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "21.4.1",
              "status": "affected",
              "version": "Radeon Driver",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Radeon Pro Software for Enterprise",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Enterprise Driver",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "TBD",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-04T22:29:12",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:30:00.000Z",
          "ID": "CVE-2020-12891",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Driver",
                            "version_value": "21.4.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Radeon Pro Software for Enterprise",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Enterprise Driver",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "TBD"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12891",
    "datePublished": "2022-02-04T22:29:12.020774Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T17:33:32.143Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12894
Vulnerability from cvelistv5
Published
2021-11-15 19:48
Modified
2024-09-17 01:45
Severity ?
Summary
Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.130Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:48:37",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12894",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12894",
    "datePublished": "2021-11-15T19:48:37.220384Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T01:45:55.094Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12963
Vulnerability from cvelistv5
Published
2021-11-15 15:58
Modified
2024-09-16 22:45
Severity ?
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:56",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12963",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12963",
    "datePublished": "2021-11-15T15:58:06.272723Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T22:45:17.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26363
Vulnerability from cvelistv5
Published
2022-05-12 18:39
Modified
2024-09-17 02:21
Severity ?
Summary
A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.452Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T18:39:33",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26363",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26363",
    "datePublished": "2022-05-12T18:39:33.159439Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T02:21:07.904Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26369
Vulnerability from cvelistv5
Published
2022-05-12 17:07
Modified
2024-09-16 19:51
Severity ?
Summary
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.431Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T17:07:32",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26369",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26369",
    "datePublished": "2022-05-12T17:07:32.274198Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T19:51:13.979Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12980
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-17 03:22
Severity ?
Summary
An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.003Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:17:16",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12980",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12980",
    "datePublished": "2021-06-11T21:49:38.162263Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T03:22:33.667Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12895
Vulnerability from cvelistv5
Published
2021-11-15 15:56
Modified
2024-09-16 22:02
Severity ?
Summary
Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:44",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12895",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12895",
    "datePublished": "2021-11-15T15:56:00.755364Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T22:02:20.505Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-31307
Vulnerability from cvelistv5
Published
2024-08-13 16:54
Modified
2024-12-03 16:30
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31307",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-13T18:03:11.598841Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-129",
                "description": "CWE-129 Improper Validation of Array Index",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-03T16:30:08.173Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  Adrenalin Edition 23.12.1 (23.30.13.01)"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "AMD Software:  PRO Edition 23.Q4 (23.30.13.03)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u0026nbsp; \u0026nbsp;Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service."
            }
          ],
          "value": "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:54:03.514Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-31307",
    "datePublished": "2024-08-13T16:54:03.514Z",
    "dateReserved": "2023-04-27T15:25:41.422Z",
    "dateUpdated": "2024-12-03T16:30:08.173Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12981
Vulnerability from cvelistv5
Published
2021-06-11 21:49
Modified
2024-09-16 18:19
Severity ?
Summary
An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.107Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:16:55",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12981",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12981",
    "datePublished": "2021-06-11T21:49:43.864896Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T18:19:38.577Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12920
Vulnerability from cvelistv5
Published
2021-11-15 15:50
Modified
2024-09-16 18:49
Severity ?
Summary
A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.124Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:50:34",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12920",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12920",
    "datePublished": "2021-11-15T15:50:34.930613Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T18:49:42.624Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12898
Vulnerability from cvelistv5
Published
2021-11-15 18:58
Modified
2024-09-17 03:03
Severity ?
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.206Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T18:58:30",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12898",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12898",
    "datePublished": "2021-11-15T18:58:30.225747Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T03:03:38.846Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12964
Vulnerability from cvelistv5
Published
2021-11-15 14:51
Modified
2024-09-16 18:28
Severity ?
Summary
A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.7.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.701Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.7.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-27T18:14:55",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12964",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.7.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12964",
    "datePublished": "2021-11-15T14:51:15.631262Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T18:28:27.531Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12960
Vulnerability from cvelistv5
Published
2021-11-15 19:47
Modified
2024-09-17 03:53
Severity ?
Summary
AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 21.4.1
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.103Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "21.4.1",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T19:47:19",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12960",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "21.4.1"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS)."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12960",
    "datePublished": "2021-11-15T19:47:19.313108Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T03:53:03.583Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12902
Vulnerability from cvelistv5
Published
2021-11-15 15:48
Modified
2024-09-16 16:59
Severity ?
Summary
Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
AMD AMD Radeon Software Version: Radeon Software   < 20.11.2
Version: Radeon Pro Software for Enterprise   < 21.Q2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.204Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Radeon Software",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "20.11.2",
              "status": "affected",
              "version": "Radeon Software",
              "versionType": "custom"
            },
            {
              "lessThan": "21.Q2",
              "status": "affected",
              "version": "Radeon Pro Software for Enterprise",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-15T15:48:41",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1000",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12902",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Radeon Software",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Software",
                            "version_value": "20.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "Radeon Pro Software for Enterprise",
                            "version_value": "21.Q2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1000",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12902",
    "datePublished": "2021-11-15T15:48:41.148192Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T16:59:09.552Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
              "versionEndExcluding": "21.q1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An out of bounds write vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privileges or denial of service."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de escritura fuera de los l\u00edmites en el controlador de gr\u00e1ficos AMD para Windows 10 puede conllevar a una escalada de privilegios o la denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12983",
  "lastModified": "2024-11-21T05:00:36.880",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-11T22:15:11.440",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 15:15
Modified
2024-11-21 05:00
Summary
A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.
Impacted products
Vendor Product Version
amd radeon_software *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information."
    },
    {
      "lang": "es",
      "value": "Se presenta un problema potencial de escalada de privilegios/denegaci\u00f3n de servicio en AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. Un atacante poco privilegiado podr\u00eda inducir potencialmente un BugCheck de Windows o escribir para filtrar informaci\u00f3n"
    }
  ],
  "id": "CVE-2020-12964",
  "lastModified": "2024-11-21T05:00:35.713",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T15:15:06.687",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Escape call interface in the AMD Graphics Driver for Windows may cause privilege escalation."
    },
    {
      "lang": "es",
      "value": "La interfaz de llamada de escape en AMD Graphics Driver para Windows puede causar una escalada de privilegios"
    }
  ],
  "id": "CVE-2020-12962",
  "lastModified": "2024-11-21T05:00:35.480",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T20:15:19.743",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:28
Summary
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094",
              "versionEndExcluding": "23.12.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0",
              "versionEndIncluding": "23.q4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service."
    },
    {
      "lang": "es",
      "value": "Una validaci\u00f3n de direcci\u00f3n DRAM insuficiente en PMFW puede permitir que un atacante privilegiado lea desde una direcci\u00f3n DRAM no v\u00e1lida a SRAM, lo que podr\u00eda provocar corrupci\u00f3n de datos o denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2023-20510",
  "lastModified": "2024-12-12T20:28:55.010",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 4.2,
        "source": "psirt@amd.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-13T17:15:18.777",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3017A2C8-6079-4639-952E-E895FB6CB9A2",
              "versionEndExcluding": "21.3.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
    },
    {
      "lang": "es",
      "value": "Una divulgaci\u00f3n de la Direcci\u00f3n de Pool del Kernel en AMD Graphics Driver para Windows 10 puede conllevar a una omisi\u00f3n de KASLR"
    }
  ],
  "id": "CVE-2020-12897",
  "lastModified": "2024-11-21T05:00:31.083",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T16:15:09.130",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
              "versionEndExcluding": "21.q1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An insufficient input validation in the AMD Graphics Driver for Windows 10 may allow unprivileged users to unload the driver, potentially causing memory corruptions in high privileged processes, which can lead to escalation of privileges or denial of service."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada insuficiente en el controlador de gr\u00e1ficos AMD para Windows 10 puede permitir que los usuarios sin privilegios descarguen el controlador, lo que podr\u00eda causar da\u00f1os en la memoria en los procesos con muchos privilegios, lo que puede conllevar a una escalada de privilegios o la denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12981",
  "lastModified": "2024-11-21T05:00:36.650",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-11T22:15:11.373",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Arbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service."
    },
    {
      "lang": "es",
      "value": "Una escritura arbitraria en AMD Graphics Driver para Windows 10 en el escape 0x40010d puede conllevar a una escritura arbitraria en la memoria del kernel o una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12894",
  "lastModified": "2024-11-21T05:00:30.813",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T20:15:19.513",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
              "versionEndExcluding": "21.q1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de divulgaci\u00f3n de  informaci\u00f3n de direcci\u00f3n de grupo de kernel/fuga de pila en el controlador de gr\u00e1ficos AMD para Windows 10 puede conllevar a una omisi\u00f3n de KASLR"
    }
  ],
  "id": "CVE-2020-12987",
  "lastModified": "2024-11-21T05:00:37.227",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-11T22:15:11.570",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-04 23:15
Modified
2024-11-21 05:00
Summary
AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.
Impacted products
Vendor Product Version
amd radeon_pro_software *
amd radeon_software *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "C5BBBA61-F9B3-41D4-BAD1-8D31C9868F6F",
              "versionEndExcluding": "21.q2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00350248-7850-480A-BACF-89DC9194F34E",
              "versionEndExcluding": "21.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable."
    },
    {
      "lang": "es",
      "value": "El software Radeon de AMD puede ser vulnerable a un secuestro de DLL mediante la variable de ruta. Un usuario no privilegiado puede ser capaz de soltar su archivo DLL malicioso en cualquier ubicaci\u00f3n que est\u00e9 en la variable de entorno path"
    }
  ],
  "id": "CVE-2020-12891",
  "lastModified": "2024-11-21T05:00:30.393",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-04T23:15:10.247",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 08:01
Summary
Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_7600 -
amd radeon_rx_7600m -
amd radeon_rx_7600m_xt -
amd radeon_rx_7600s -
amd radeon_rx_7700_xt -
amd radeon_rx_7700s -
amd radeon_rx_7800_xt -
amd radeon_rx_7900_gre -
amd radeon_rx_7900_xt -
amd radeon_rx_7900_xtx -
amd radeon_rx_7900m -
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300 -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_pro_w7500 -
amd radeon_pro_w7600 -
amd radeon_pro_w7800 -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd radeon_pro_vega_56_firmware -
amd radeon_pro_vega_56 -
amd radeon_pro_vega_64_firmware -
amd radeon_pro_vega_64 -
amd radeon_software *
amd radeon_software *
amd ryzen_3_3015ce -
amd ryzen_3_3015e -
amd ryzen_3_4100 -
amd ryzen_3_4300g -
amd ryzen_3_4300ge -
amd ryzen_3_4300u -
amd ryzen_3_5300g -
amd ryzen_3_5300ge -
amd ryzen_3_5300u -
amd ryzen_5_4500 -
amd ryzen_5_4500u -
amd ryzen_5_4600g -
amd ryzen_5_4600ge -
amd ryzen_5_4600h -
amd ryzen_5_4600hs -
amd ryzen_5_4600u -
amd ryzen_5_4680u -
amd ryzen_5_5500h -
amd ryzen_5_5500u -
amd ryzen_5_5600g -
amd ryzen_5_5600ge -
amd ryzen_5_pro_3200g -
amd ryzen_5_pro_3200ge -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3400g -
amd ryzen_5_pro_3400ge -
amd ryzen_7_4700g -
amd ryzen_7_4700ge -
amd ryzen_7_4700u -
amd ryzen_7_4800h -
amd ryzen_7_4800hs -
amd ryzen_7_4980u -
amd ryzen_7_5700g -
amd ryzen_7_5700ge -
amd ryzen_7_5700u -
amd ryzen_9_4900h -
amd ryzen_9_4900hs -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
              "versionEndExcluding": "23.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
              "versionEndExcluding": "23.q3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
              "versionEndExcluding": "23.7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
              "versionEndExcluding": "23.q3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\n"
    },
    {
      "lang": "es",
      "value": "Una validaci\u00f3n de entrada incorrecta en el controlador de pantalla AMD RadeonTM Graphics puede permitir que un atacante da\u00f1e la pantalla, lo que podr\u00eda provocar una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2023-31320",
  "lastModified": "2024-11-21T08:01:46.340",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-14T19:15:25.070",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2025-02-13 17:16
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
Impacted products
Vendor Product Version
intel radeon_rx_vega_m_firmware *
intel core_i5-8305g -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel nuc_8_enthusiast_nuc8i7hnkqc -
intel nuc_8_enthusiast_nuc8i7hvkva -
intel nuc_8_enthusiast_nuc8i7hvkvaw -
intel nuc_kit_nuc8i7hnk -
intel nuc_kit_nuc8i7hvk -
amd radeon_software *
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_7600 -
amd radeon_rx_7600m -
amd radeon_rx_7600m_xt -
amd radeon_rx_7600s -
amd radeon_rx_7700_xt -
amd radeon_rx_7700s -
amd radeon_rx_7800_xt -
amd radeon_rx_7900_gre -
amd radeon_rx_7900_xt -
amd radeon_rx_7900_xtx -
amd radeon_rx_7900m -
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300 -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_pro_w7500 -
amd radeon_pro_w7600 -
amd radeon_pro_w7800 -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd radeon_pro_vega_56_firmware -
amd radeon_pro_vega_56 -
amd radeon_pro_vega_64_firmware -
amd radeon_pro_vega_64 -
amd radeon_software *
amd radeon_software *
amd ryzen_3_3015ce -
amd ryzen_3_3015e -
amd ryzen_3_4100 -
amd ryzen_3_4300g -
amd ryzen_3_4300ge -
amd ryzen_3_4300u -
amd ryzen_3_5300g -
amd ryzen_3_5300ge -
amd ryzen_3_5300u -
amd ryzen_5_4500 -
amd ryzen_5_4500u -
amd ryzen_5_4600g -
amd ryzen_5_4600ge -
amd ryzen_5_4600h -
amd ryzen_5_4600hs -
amd ryzen_5_4600u -
amd ryzen_5_4680u -
amd ryzen_5_5500h -
amd ryzen_5_5500u -
amd ryzen_5_5600g -
amd ryzen_5_5600ge -
amd ryzen_5_pro_3200g -
amd ryzen_5_pro_3200ge -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3400g -
amd ryzen_5_pro_3400ge -
amd ryzen_7_4700g -
amd ryzen_7_4700ge -
amd ryzen_7_4700u -
amd ryzen_7_4800h -
amd ryzen_7_4800hs -
amd ryzen_7_4980u -
amd ryzen_7_5700g -
amd ryzen_7_5700ge -
amd ryzen_7_5700u -
amd ryzen_9_4900h -
amd ryzen_9_4900hs -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4",
              "versionEndExcluding": "23.10.01.46",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A4CCCB-01CC-4488-9336-C0C379ABE609",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
              "versionEndExcluding": "23.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
              "versionEndExcluding": "23.q3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
              "versionEndExcluding": "23.7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
              "versionEndExcluding": "23.q3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution."
    },
    {
      "lang": "es",
      "value": "La verificaci\u00f3n inadecuada de la firma del controlador RadeonTM RX Vega M Graphics para Windows puede permitir que un atacante con privilegios de administrador inicie RadeonInstaller.exe sin validar la firma del archivo, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2023-20568",
  "lastModified": "2025-02-13T17:16:01.573",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-14T19:15:15.930",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-347"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:00
Summary
Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Impacted products
Vendor Product Version
amd enterprise_driver *
amd radeon_pro_software *
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd ryzen_3_2200ge_firmware -
amd ryzen_3_2200ge -
amd ryzen_3_2200g_firmware -
amd ryzen_3_2200g -
amd ryzen_5_2400ge_firmware -
amd ryzen_5_2400ge -
amd ryzen_5_2400g_firmware -
amd ryzen_5_2400g -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_5_3500_firmware -
amd ryzen_5_3500 -
amd ryzen_5_3500x_firmware -
amd ryzen_5_3500x -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_9_3900_firmware -
amd ryzen_9_3900 -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3900xt_firmware -
amd ryzen_9_3900xt -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_5_5500_firmware -
amd ryzen_5_5500 -
amd ryzen_5_5600_firmware -
amd ryzen_5_5600 -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_7_5700x_firmware -
amd ryzen_7_5700x -
amd ryzen_7_5800x_firmware -
amd ryzen_7_5800x -
amd ryzen_7_5800_firmware -
amd ryzen_7_5800 -
amd ryzen_7_5800x3d_firmware -
amd ryzen_7_5800x3d -
amd ryzen_9_5900_firmware -
amd ryzen_9_5900 -
amd ryzen_9_5900x_firmware -
amd ryzen_9_5900x -
amd ryzen_9_5950x_firmware -
amd ryzen_9_5950x -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -
amd athlon_silver_3050e_firmware -
amd athlon_silver_3050e -
amd athlon_pro_3045b_firmware -
amd athlon_pro_3045b -
amd athlon_silver_3050u_firmware -
amd athlon_silver_3050u -
amd athlon_silver_3050c_firmware -
amd athlon_silver_3050c -
amd athlon_pro_3145b_firmware -
amd athlon_pro_3145b -
amd athlon_gold_3150u_firmware -
amd athlon_gold_3150u -
amd athlon_gold_3150c_firmware -
amd athlon_gold_3150c -
amd ryzen_3_3250u_firmware -
amd ryzen_3_3250u -
amd ryzen_3_3250c_firmware -
amd ryzen_3_3250c -
amd amd_3020e_firmware -
amd amd_3020e -
amd amd_3015e_firmware -
amd amd_3015e -
amd amd_3015ce_firmware -
amd amd_3015ce -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_3_3300u_firmware -
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware -
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware -
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware -
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware -
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware -
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware -
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware -
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware -
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware -
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware -
amd ryzen_7_3780u -
amd ryzen_3_pro_3200ge_firmware -
amd ryzen_3_pro_3200ge -
amd ryzen_3_3200g_firmware -
amd ryzen_3_3200g -
amd ryzen_3_pro_3200g_firmware -
amd ryzen_3_pro_3200g -
amd ryzen_5_pro_3350ge_firmware -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3350g_firmware -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3400ge_firmware -
amd ryzen_5_pro_3400ge -
amd ryzen_5_pro_3400g_firmware -
amd ryzen_5_pro_3400g -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
              "versionEndExcluding": "22.10.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
              "versionEndExcluding": "22.q2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
              "versionEndExcluding": "22.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4350ADE3-9A31-4A23-9B15-7A44E8F29E90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "777D94BA-613B-49E9-B1B3-2A9E0FC35908",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6882B4E1-0BFF-4093-BE67-72294949C3F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E741A31-8265-45E0-9834-23D00D5F8176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "913A2DC9-4215-486B-BD15-3AF515E3CDCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF8A936-58AE-44BB-897E-44782232394F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9FC3889-3F62-48AC-876D-5A630A5E2AD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D79E460A-D34C-4120-8529-F32988793DC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "069392FC-51DB-49F0-B30B-8ED46C694057",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D4403E-C626-4817-B0C9-ECEC420C517D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58EE3F9B-6950-4F83-B0BE-ADA560457BC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "945182A3-1BE3-459D-BC45-5554FB905C3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity."
    },
    {
      "lang": "es",
      "value": "El manejo inadecuado de los par\u00e1metros en el kernel del AMD Secure Processor (ASP) puede permitir que un atacante privilegiado eleve sus privilegios, lo que podr\u00eda provocar una p\u00e9rdida de integridad."
    }
  ],
  "id": "CVE-2020-12931",
  "lastModified": "2024-11-21T05:00:33.803",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-09T21:15:11.407",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Summary
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
Impacted products
Vendor Product Version
amd enterprise_driver *
amd radeon_pro_software *
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd ryzen_3_2200ge_firmware -
amd ryzen_3_2200ge -
amd ryzen_3_2200g_firmware -
amd ryzen_3_2200g -
amd ryzen_5_2400ge_firmware -
amd ryzen_5_2400ge -
amd ryzen_5_2400g_firmware -
amd ryzen_5_2400g -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_5_3500_firmware -
amd ryzen_5_3500 -
amd ryzen_5_3500x_firmware -
amd ryzen_5_3500x -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_9_3900_firmware -
amd ryzen_9_3900 -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3900xt_firmware -
amd ryzen_9_3900xt -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_5_5500_firmware -
amd ryzen_5_5500 -
amd ryzen_5_5600_firmware -
amd ryzen_5_5600 -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_7_5700x_firmware -
amd ryzen_7_5700x -
amd ryzen_7_5800x_firmware -
amd ryzen_7_5800x -
amd ryzen_7_5800_firmware -
amd ryzen_7_5800 -
amd ryzen_7_5800x3d_firmware -
amd ryzen_7_5800x3d -
amd ryzen_9_5900_firmware -
amd ryzen_9_5900 -
amd ryzen_9_5900x_firmware -
amd ryzen_9_5900x -
amd ryzen_9_5950x_firmware -
amd ryzen_9_5950x -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -
amd athlon_silver_3050e_firmware -
amd athlon_silver_3050e -
amd athlon_pro_3045b_firmware -
amd athlon_pro_3045b -
amd athlon_silver_3050u_firmware -
amd athlon_silver_3050u -
amd athlon_silver_3050c_firmware -
amd athlon_silver_3050c -
amd athlon_pro_3145b_firmware -
amd athlon_pro_3145b -
amd athlon_gold_3150u_firmware -
amd athlon_gold_3150u -
amd athlon_gold_3150c_firmware -
amd athlon_gold_3150c -
amd ryzen_3_3250u_firmware -
amd ryzen_3_3250u -
amd ryzen_3_3250c_firmware -
amd ryzen_3_3250c -
amd amd_3020e_firmware -
amd amd_3020e -
amd amd_3015e_firmware -
amd amd_3015e -
amd amd_3015ce_firmware -
amd amd_3015ce -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_3_3300u_firmware -
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware -
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware -
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware -
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware -
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware -
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware -
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware -
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware -
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware -
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware -
amd ryzen_7_3780u -
amd ryzen_3_pro_3200ge_firmware -
amd ryzen_3_pro_3200ge -
amd ryzen_3_3200g_firmware -
amd ryzen_3_3200g -
amd ryzen_3_pro_3200g_firmware -
amd ryzen_3_pro_3200g -
amd ryzen_5_pro_3350ge_firmware -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3350g_firmware -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3400ge_firmware -
amd ryzen_5_pro_3400ge -
amd ryzen_5_pro_3400g_firmware -
amd ryzen_5_pro_3400g -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
              "versionEndExcluding": "22.10.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
              "versionEndExcluding": "22.q2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
              "versionEndExcluding": "22.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4350ADE3-9A31-4A23-9B15-7A44E8F29E90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "777D94BA-613B-49E9-B1B3-2A9E0FC35908",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6882B4E1-0BFF-4093-BE67-72294949C3F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E741A31-8265-45E0-9834-23D00D5F8176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "913A2DC9-4215-486B-BD15-3AF515E3CDCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF8A936-58AE-44BB-897E-44782232394F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9FC3889-3F62-48AC-876D-5A630A5E2AD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D79E460A-D34C-4120-8529-F32988793DC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "069392FC-51DB-49F0-B30B-8ED46C694057",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D4403E-C626-4817-B0C9-ECEC420C517D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58EE3F9B-6950-4F83-B0BE-ADA560457BC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "945182A3-1BE3-459D-BC45-5554FB905C3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient verification of missing size check in \u0027LoadModule\u0027 may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA."
    },
    {
      "lang": "es",
      "value": "Una verificaci\u00f3n insuficiente del tama\u00f1o faltante en \u0027LoadModule\u0027 puede provocar una escritura fuera de l\u00edmites que podr\u00eda permitir que un atacante con privilegios obtenga la ejecuci\u00f3n de c\u00f3digo del sistema operativo/kernel cargando un TA malicioso."
    }
  ],
  "id": "CVE-2021-26392",
  "lastModified": "2024-11-21T05:56:16.773",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-09T21:15:12.360",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Arbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service."
    },
    {
      "lang": "es",
      "value": "Una lectura arbitraria en AMD Graphics Driver para Windows 10 puede conllevar a una omisi\u00f3n de KASLR o una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12899",
  "lastModified": "2024-11-21T05:00:31.330",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T16:15:09.177",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de escritura arbitraria en AMD Radeon Graphics Driver para Windows 10 permite potencialmente a usuarios no privilegiados conseguir una escalada de privilegios y causar una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12900",
  "lastModified": "2024-11-21T05:00:31.463",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T16:15:09.230",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:41
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
Impacted products
Vendor Product Version
amd radeon_software *
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_gre -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_software *
amd radeon_pro_w6300 -
amd radeon_pro_w6400 -
amd radeon_pro_w6600 -
amd radeon_pro_w6800 -
amd ryzen_9_5980hx_firmware *
amd ryzen_9_5980hx -
amd ryzen_3_3300u_firmware *
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware *
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware *
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware *
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware *
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware *
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware *
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware *
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware *
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware *
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware *
amd ryzen_7_3780u -
amd athlon_gold_3150c_firmware *
amd athlon_gold_3150c -
amd athlon_gold_3150u_firmware *
amd athlon_gold_3150u -
amd athlon_pro_3145b_firmware *
amd athlon_pro_3145b -
amd athlon_silver_3050c_firmware *
amd athlon_silver_3050c -
amd athlon_silver_3050u_firmware *
amd athlon_silver_3050u -
amd athlon_pro_3045b_firmware *
amd athlon_pro_3045b -
amd athlon_silver_3050e_firmware *
amd athlon_silver_3050e -
amd athlon_gold_pro_3150g_firmware *
amd athlon_gold_pro_3150g -
amd athlon_gold_3150g_firmware *
amd athlon_gold_3150g -
amd athlon_gold_pro_3150ge_firmware *
amd athlon_gold_pro_3150ge -
amd athlon_pro_300ge_firmware *
amd athlon_pro_300ge -
amd ryzen_3_4300ge_firmware *
amd ryzen_3_4300ge -
amd ryzen_5_4600ge_firmware *
amd ryzen_5_4600ge -
amd ryzen_7_4700ge_firmware *
amd ryzen_7_4700ge -
amd ryzen_3_4300g_firmware *
amd ryzen_3_4300g -
amd ryzen_5_4600g_firmware *
amd ryzen_5_4600g -
amd ryzen_7_4700g_firmware *
amd ryzen_7_4700g -
amd ryzen_3_5300ge_firmware *
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware *
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware *
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware *
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware *
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware *
amd ryzen_7_5700g -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094",
              "versionEndExcluding": "23.12.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0",
              "versionEndIncluding": "23.q4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1EFDD49-95E7-4E92-A476-9F7E9D2B222A",
              "versionEndExcluding": "cezannepi-fp6_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "799912F4-2A5D-41F6-B645-5972B966617B",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D7DEDAC-51F3-4B72-8958-72CFDB8572A0",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FE9FAE-DEC6-42FA-8622-3D5B0C845928",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3770F180-FB7C-410F-B49D-D30AA05326BC",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF809F01-E6B3-4975-AC8B-EE2FDD199B14",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2AC7D6-47AB-4178-9585-34293B36F576",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05D78A9-2CED-4BA1-8382-BC8D722E91D9",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8233A5D0-7796-4164-99CF-BB23B74563DF",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03194384-10A2-4B6D-BED1-C01908249969",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03BCFD6B-04D1-4A27-AB06-90F8BA894E2C",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "754DE9E2-F441-4D7F-BDAB-6ADED0F9D76A",
              "versionEndExcluding": "picassopi-fp5_1.0.0.e",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A192415A-41F1-4DF9-A351-A6E879E45431",
              "versionEndExcluding": "comboam4pi_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F10B69-9959-4977-893B-076BFBAC1BA6",
              "versionEndExcluding": "comboam4pi_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7217BA72-D101-49C1-86B7-A63BFA01A056",
              "versionEndExcluding": "comboam4pi_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "045D34B9-50A3-453D-A9E1-64180D1E1B5C",
              "versionEndExcluding": "comboam4pi_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C52E5C9A-DC2E-428F-97CF-61C7340C0579",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AB8A11-9C17-4528-A582-8340964C76A7",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E240139-34E9-4D68-AEBB-6E641C75AB82",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B184CA4-DA2E-4EF7-997C-BA563CB41A08",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "40EDD65C-1101-4F0C-AD08-007A97D7184E",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DCE8037-1ED8-468A-9FBF-B79809A8089A",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2201670-E611-4C1E-BD06-E2B4262C3687",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B0598FA-5EB7-41FF-AC46-BFBCE1EA1271",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C51F223-5529-4D10-A7AF-44198DE58684",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35C8C0CE-AA13-434D-83BD-2DA454B1937C",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5A8225E-A53A-4602-ACF6-F142D1CCF9FD",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF3486C1-EAD5-4861-8463-506D59A5F7DA",
              "versionEndExcluding": "comboam4v2_pi_1.2.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability."
    },
    {
      "lang": "es",
      "value": "Un atacante malicioso en x86 puede configurar mal las regiones de memoria confiable (TMR), lo que puede permitirle establecer un rango de direcciones arbitrario para la TMR, lo que podr\u00eda provocar una p\u00e9rdida de integridad y disponibilidad."
    }
  ],
  "id": "CVE-2021-26367",
  "lastModified": "2024-12-12T20:41:56.120",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.2,
        "source": "psirt@amd.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-13T17:15:17.360",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites en AMD Graphics Driver for Windows 10 en Escape 0x3004203 puede conllevar a una divulgaci\u00f3n de informaci\u00f3n arbitraria"
    }
  ],
  "id": "CVE-2020-12904",
  "lastModified": "2024-11-21T05:00:32.063",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T16:15:09.330",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Pool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service."
    },
    {
      "lang": "es",
      "value": "El desbordamiento de Pool/Pila en AMD Graphics Driver para Windows 10 en el escape 0x110037 puede conllevar a una escalada de privilegios, una divulgaci\u00f3n de informaci\u00f3n o una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12895",
  "lastModified": "2024-11-21T05:00:30.937",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T16:15:09.077",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Summary
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
Impacted products
Vendor Product Version
amd radeon_software -
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300g_firmware -
amd ryzen_3_3300g -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_5_3450g_firmware -
amd ryzen_5_3450g -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_threadripper_2920x_firmware -
amd ryzen_threadripper_2920x -
amd ryzen_threadripper_2950x_firmware -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2970wx_firmware -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2990wx_firmware -
amd ryzen_threadripper_2990wx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6678421F-CD05-445F-B114-293609732777",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses."
    },
    {
      "lang": "es",
      "value": "Una UApp o ABL maliciosa o comprometida puede ser usada por un atacante para enviar una llamada al sistema malformada al cargador de arranque, resultando en accesos a memoria fuera de l\u00edmites"
    }
  ],
  "id": "CVE-2021-26369",
  "lastModified": "2024-11-21T05:56:13.677",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-12T18:16:53.257",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Arbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
    },
    {
      "lang": "es",
      "value": "Una escalada de privilegios por Disminuci\u00f3n Arbitraria en AMD Graphics Driver para Windows 10 puede conllevar a una escalada de privilegios o una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12902",
  "lastModified": "2024-11-21T05:00:31.750",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T16:15:09.280",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure."
    },
    {
      "lang": "es",
      "value": "Un Uso de Memoria Previamente Liberada en AMD Graphics Driver para Windows 10 puede conllevar un desv\u00edo de KASLR o la divulgaci\u00f3n de informaci\u00f3n"
    }
  ],
  "id": "CVE-2020-12901",
  "lastModified": "2024-11-21T05:00:31.603",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T20:15:19.560",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service."
    },
    {
      "lang": "es",
      "value": "Una lectura y escritura fuera de l\u00edmites en AMD Graphics Driver para Windows 10 en Escape 0x6002d03 puede conllevar a una escalada de privilegios o una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12903",
  "lastModified": "2024-11-21T05:00:31.920",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T20:15:19.603",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Summary
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
              "versionEndExcluding": "22.10.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
              "versionEndExcluding": "22.q2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
              "versionEndExcluding": "22.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor\u2019s encrypted memory contents which may lead to arbitrary code execution in ASP."
    },
    {
      "lang": "es",
      "value": "Un atacante con acceso local al sistema puede realizar modificaciones no autorizadas en la configuraci\u00f3n de seguridad de los registros SOC. Esto podr\u00eda permitir una posible corrupci\u00f3n del contenido de la memoria cifrada del procesador seguro AMD, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en ASP."
    }
  ],
  "id": "CVE-2021-26360",
  "lastModified": "2024-11-21T05:56:12.317",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-09T21:15:11.690",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-12 19:15
Modified
2024-11-21 05:56
Summary
Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.
Impacted products
Vendor Product Version
amd radeon_software -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_5300g_firmware -
amd ryzen_5300g -
amd ryzen_5300ge_firmware -
amd ryzen_5300ge -
amd ryzen_5600g_firmware -
amd ryzen_5600g -
amd ryzen_5600ge_firmware -
amd ryzen_5600ge -
amd ryzen_5600x_firmware -
amd ryzen_5600x -
amd ryzen_5700g_firmware -
amd ryzen_5700g -
amd ryzen_5700ge_firmware -
amd ryzen_5700ge -
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd ryzen_5800x_firmware -
amd ryzen_5800x -
amd ryzen_5800x3d_firmware -
amd ryzen_5800x3d -
amd ryzen_5900x_firmware -
amd ryzen_5900x -
amd ryzen_5950x_firmware -
amd ryzen_5950x -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_threadripper_2920x_firmware -
amd ryzen_threadripper_2920x -
amd ryzen_threadripper_2950x_firmware -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2970wx_firmware -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2990wx_firmware -
amd ryzen_threadripper_2990wx -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -
amd ryzen_3_3300g_firmware -
amd ryzen_3_3300g -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_5_3450g_firmware -
amd ryzen_5_3450g -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "833B79C9-7F23-4CDB-8B9B-3699E43B9AE4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D857EFE-B24E-4228-BB1E-34F9BC763A11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74FA8650-B46B-4034-85DA-AC568B517D37",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CC472B-1502-402D-B2AC-8A63A69F2A27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F2BF6E-E3B0-456D-ABC1-A8687C6E8CA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D32F62EA-D89E-4F30-8ABA-4887EC82EEF6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F07C72-3C8F-493D-A94E-4FEDD43936D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A60E8FD3-F6E4-42FB-96C3-B07D597560AE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B93E2C9E-66AA-433B-ADB8-A6AD4F0C9A80",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1A9BEC-27AB-40AD-BBED-4420451D3793",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6678421F-CD05-445F-B114-293609732777",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D0CF3A-54CC-42A0-9075-6923EB3023A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F6B331-4C0F-49FF-A39F-381B9ADE3483",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5800x3d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "888D3667-BBD7-45E5-BA38-37D0A007408D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "238EA54F-4809-4D8F-9F18-71135FED9D05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E11988B-5467-4585-9A95-AD3C7E0480F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050C802C-D8C7-4D58-BA6E-AC48EEF25215",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7522E8A-74E4-42D8-9B6C-DD1FB6C4CE65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution."
    },
    {
      "lang": "es",
      "value": "Una falta de verificaci\u00f3n del protocolo en el SMM podr\u00eda permitir a un atacante controlar el protocolo y modificar la flash SPI, resultando en una potencial ejecuci\u00f3n de c\u00f3digo arbitrario"
    }
  ],
  "id": "CVE-2021-26317",
  "lastModified": "2024-11-21T05:56:05.107",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-12T19:15:48.070",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-12 19:15
Modified
2024-11-21 05:56
Summary
A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.
Impacted products
Vendor Product Version
amd radeon_software -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300g_firmware -
amd ryzen_3_3300g -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_5_3450g_firmware -
amd ryzen_5_3450g -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure."
    },
    {
      "lang": "es",
      "value": "Una UApp o ABL maliciosa o comprometida podr\u00eda potencialmente cambiar el valor que el ASP usa para su DRAM reservada, a uno fuera del \u00e1rea cercada, conllevando potencialmente a una exposici\u00f3n de datos"
    }
  ],
  "id": "CVE-2021-26363",
  "lastModified": "2024-11-21T05:56:12.753",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-12T19:15:48.107",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
              "versionEndExcluding": "21.q1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de lectura y escritura fuera de los l\u00edmites en el controlador de gr\u00e1ficos AMD para Windows 10 puede conllevar a una escalada de privilegios o denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12980",
  "lastModified": "2024-11-21T05:00:36.517",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-11T22:15:11.337",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        },
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de comprobaci\u00f3n de punteros insuficiente en AMD Graphics Driver para Windows puede permitir a usuarios no privilegiados comprometer el sistema"
    }
  ],
  "id": "CVE-2020-12963",
  "lastModified": "2024-11-21T05:00:35.597",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T16:15:09.480",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-763"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00350248-7850-480A-BACF-89DC9194F34E",
              "versionEndExcluding": "21.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS)."
    },
    {
      "lang": "es",
      "value": "AMD Graphics Driver para Windows 10, amdfender.sys puede manejar incorrectamente la comprobaci\u00f3n de entrada en InputBuffer, lo que puede resultar en una denegaci\u00f3n de servicio (DoS)"
    }
  ],
  "id": "CVE-2020-12960",
  "lastModified": "2024-11-21T05:00:35.200",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T20:15:19.697",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Summary
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
Impacted products
Vendor Product Version
amd enterprise_driver *
amd radeon_pro_software *
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
              "versionEndExcluding": "22.10.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
              "versionEndExcluding": "22.q2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
              "versionEndExcluding": "22.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel."
    },
    {
      "lang": "es",
      "value": "La verificaci\u00f3n insuficiente de m\u00faltiples firmas de encabezado mientras se carga una aplicaci\u00f3n confiable (TA) puede permitir que un atacante con privilegios obtenga la ejecuci\u00f3n de c\u00f3digo en esa TA o el sistema operativo/kernel."
    }
  ],
  "id": "CVE-2021-26391",
  "lastModified": "2024-11-21T05:56:16.620",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-09T21:15:12.150",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service."
    },
    {
      "lang": "es",
      "value": "Un Desbordamiento del B\u00fafer de la Pila en AMD Graphics Driver para Windows 10 en Escape 0x15002a puede conllevar a una escalada de privilegios o una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12893",
  "lastModified": "2024-11-21T05:00:30.680",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T20:15:19.467",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:00
Summary
Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Impacted products
Vendor Product Version
amd enterprise_driver *
amd radeon_pro_software *
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd ryzen_3_2200ge_firmware -
amd ryzen_3_2200ge -
amd ryzen_3_2200g_firmware -
amd ryzen_3_2200g -
amd ryzen_5_2400ge_firmware -
amd ryzen_5_2400ge -
amd ryzen_5_2400g_firmware -
amd ryzen_5_2400g -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_5_3500_firmware -
amd ryzen_5_3500 -
amd ryzen_5_3500x_firmware -
amd ryzen_5_3500x -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_9_3900_firmware -
amd ryzen_9_3900 -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3900xt_firmware -
amd ryzen_9_3900xt -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_5_5500_firmware -
amd ryzen_5_5500 -
amd ryzen_5_5600_firmware -
amd ryzen_5_5600 -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_7_5700x_firmware -
amd ryzen_7_5700x -
amd ryzen_7_5800x_firmware -
amd ryzen_7_5800x -
amd ryzen_7_5800_firmware -
amd ryzen_7_5800 -
amd ryzen_7_5800x3d_firmware -
amd ryzen_7_5800x3d -
amd ryzen_9_5900_firmware -
amd ryzen_9_5900 -
amd ryzen_9_5900x_firmware -
amd ryzen_9_5900x -
amd ryzen_9_5950x_firmware -
amd ryzen_9_5950x -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -
amd athlon_silver_3050e_firmware -
amd athlon_silver_3050e -
amd athlon_pro_3045b_firmware -
amd athlon_pro_3045b -
amd athlon_silver_3050u_firmware -
amd athlon_silver_3050u -
amd athlon_silver_3050c_firmware -
amd athlon_silver_3050c -
amd athlon_pro_3145b_firmware -
amd athlon_pro_3145b -
amd athlon_gold_3150u_firmware -
amd athlon_gold_3150u -
amd athlon_gold_3150c_firmware -
amd athlon_gold_3150c -
amd ryzen_3_3250u_firmware -
amd ryzen_3_3250u -
amd ryzen_3_3250c_firmware -
amd ryzen_3_3250c -
amd amd_3020e_firmware -
amd amd_3020e -
amd amd_3015e_firmware -
amd amd_3015e -
amd amd_3015ce_firmware -
amd amd_3015ce -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_3_3300u_firmware -
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware -
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware -
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware -
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware -
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware -
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware -
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware -
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware -
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware -
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware -
amd ryzen_7_3780u -
amd ryzen_3_pro_3200ge_firmware -
amd ryzen_3_pro_3200ge -
amd ryzen_3_3200g_firmware -
amd ryzen_3_3200g -
amd ryzen_3_pro_3200g_firmware -
amd ryzen_3_pro_3200g -
amd ryzen_5_pro_3350ge_firmware -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3350g_firmware -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3400ge_firmware -
amd ryzen_5_pro_3400ge -
amd ryzen_5_pro_3400g_firmware -
amd ryzen_5_pro_3400g -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
              "versionEndExcluding": "22.10.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
              "versionEndExcluding": "22.q2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
              "versionEndExcluding": "22.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4350ADE3-9A31-4A23-9B15-7A44E8F29E90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E52108F-FAAE-4075-8F87-239008E77009",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04B41F4-E5BD-4140-9A59-FE5AEF099CCB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53089E9-4CD9-4E0A-92B3-7D4E4F7BE12B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84FE65F0-3F46-4F0E-AF1C-3ED950F12F1E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "777D94BA-613B-49E9-B1B3-2A9E0FC35908",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6882B4E1-0BFF-4093-BE67-72294949C3F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E741A31-8265-45E0-9834-23D00D5F8176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "913A2DC9-4215-486B-BD15-3AF515E3CDCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF8A936-58AE-44BB-897E-44782232394F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9FC3889-3F62-48AC-876D-5A630A5E2AD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D79E460A-D34C-4120-8529-F32988793DC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "069392FC-51DB-49F0-B30B-8ED46C694057",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D4403E-C626-4817-B0C9-ECEC420C517D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58EE3F9B-6950-4F83-B0BE-ADA560457BC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "945182A3-1BE3-459D-BC45-5554FB905C3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity."
    },
    {
      "lang": "es",
      "value": "El manejo inadecuado de los par\u00e1metros en los controladores del AMD Secure Processor (ASP) puede permitir que un atacante privilegiado eleve sus privilegios, lo que podr\u00eda provocar una p\u00e9rdida de integridad."
    }
  ],
  "id": "CVE-2020-12930",
  "lastModified": "2024-11-21T05:00:33.470",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-09T21:15:10.580",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 05:56
Summary
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
Impacted products
Vendor Product Version
amd enterprise_driver *
amd radeon_pro_software *
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd ryzen_3_2200ge_firmware -
amd ryzen_3_2200ge -
amd ryzen_3_2200g_firmware -
amd ryzen_3_2200g -
amd ryzen_5_2400ge_firmware -
amd ryzen_5_2400ge -
amd ryzen_5_2400g_firmware -
amd ryzen_5_2400g -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd athlon_silver_3050e_firmware -
amd athlon_silver_3050e -
amd athlon_pro_3045b_firmware -
amd athlon_pro_3045b -
amd athlon_silver_3050u_firmware -
amd athlon_silver_3050u -
amd athlon_silver_3050c_firmware -
amd athlon_silver_3050c -
amd athlon_pro_3145b_firmware -
amd athlon_pro_3145b -
amd athlon_gold_3150u_firmware -
amd athlon_gold_3150u -
amd athlon_gold_3150c_firmware -
amd athlon_gold_3150c -
amd ryzen_3_3250u_firmware -
amd ryzen_3_3250u -
amd ryzen_3_3250c_firmware -
amd ryzen_3_3250c -
amd amd_3020e_firmware -
amd amd_3020e -
amd amd_3015e_firmware -
amd amd_3015e -
amd amd_3015ce_firmware -
amd amd_3015ce -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_3_3300u_firmware -
amd ryzen_3_3300u -
amd ryzen_3_3350u_firmware -
amd ryzen_3_3350u -
amd ryzen_5_3450u_firmware -
amd ryzen_5_3450u -
amd ryzen_5_3500u_firmware -
amd ryzen_5_3500u -
amd ryzen_5_3500c_firmware -
amd ryzen_5_3500c -
amd ryzen_5_3550h_firmware -
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware -
amd ryzen_5_3580u -
amd ryzen_7_3700u_firmware -
amd ryzen_7_3700u -
amd ryzen_7_3700c_firmware -
amd ryzen_7_3700c -
amd ryzen_7_3750h_firmware -
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware -
amd ryzen_7_3780u -
amd ryzen_3_pro_3200ge_firmware -
amd ryzen_3_pro_3200ge -
amd ryzen_3_3200g_firmware -
amd ryzen_3_3200g -
amd ryzen_3_pro_3200g_firmware -
amd ryzen_3_pro_3200g -
amd ryzen_5_pro_3350ge_firmware -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3350g_firmware -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3400ge_firmware -
amd ryzen_5_pro_3400ge -
amd ryzen_5_pro_3400g_firmware -
amd ryzen_5_pro_3400g -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F418EA2F-C021-44A7-9A8F-F6512A857BF9",
              "versionEndExcluding": "22.10.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "5C79E0A6-9108-449C-AD2B-6FDF1FB7D643",
              "versionEndExcluding": "22.q2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AEE9E9-3A38-4483-AD76-2CEA7096BF0A",
              "versionEndExcluding": "22.5.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3C57977-E2BA-494F-AA3C-B460117B2996",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0D0E24-0615-4F6C-947D-CFA59D114486",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C3746E-6D5F-47B5-BE13-1A6DC004F79B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B682A8FF-B83F-41A5-BA22-4394EC0C4457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B38ABACD-4E5D-440C-9464-C894DB610C94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B230F1D4-FF59-43E5-BC20-0BCD43A55683",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2503E43D-8415-4702-B7AA-22C472F4BE51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09ADB589-F43C-43A5-8CA6-B9D4D3294880",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40E3B591-EBC2-4C6A-8574-33F27F9AAE17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "951CA892-BAE2-46A4-BC86-0A205A4FA218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3045b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6882B4E1-0BFF-4093-BE67-72294949C3F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "064D6E4E-56D7-4E37-AC8C-7F3DDAA68B61",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_silver_3050c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E741A31-8265-45E0-9834-23D00D5F8176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE30066-A56C-4997-BED2-FEB4F61D9F09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_pro_3145b_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D642E6-4D91-49C3-B8BB-8B4575CE99D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E514E0C-397F-4DF3-AD79-D7C800BAA28A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "610909ED-A636-4007-A50F-500057340E70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_gold_3150c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1902D5CE-4BBB-45F7-9D52-28AF43F460CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2293F6A-ECB3-462B-9CB6-1DF0EF43A816",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "913A2DC9-4215-486B-BD15-3AF515E3CDCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1708574D-CFD3-4CB7-9037-8B5D4070E5BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3020e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF8A936-58AE-44BB-897E-44782232394F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3020e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9FC3889-3F62-48AC-876D-5A630A5E2AD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D79E460A-D34C-4120-8529-F32988793DC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3015e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F8785AD-4DC9-4EF1-A04A-8A4B21E0F3B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:amd_3015ce_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "069392FC-51DB-49F0-B30B-8ED46C694057",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:amd_3015ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7CF1D17-05FD-4A2C-8339-C72B4BA27218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D4403E-C626-4817-B0C9-ECEC420C517D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "533144EB-802F-496D-8C09-15AEA537F89B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58EE3F9B-6950-4F83-B0BE-ADA560457BC1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B16B55B-11B3-43DB-860A-62CD3020B536",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "945182A3-1BE3-459D-BC45-5554FB905C3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C03B5C8-9337-422B-9474-08EBBD0E0A45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality."
    },
    {
      "lang": "es",
      "value": "Una limpieza de memoria insuficiente en AMD Secure Processor (ASP) Trusted Execution Environment (TEE)  puede permitir que un atacante autenticado con privilegios genere un TA firmado v\u00e1lido y potencialmente envenenar el contenido de la memoria del proceso con datos controlados por el atacante, lo que resulta en una p\u00e9rdida de confidencialidad."
    }
  ],
  "id": "CVE-2021-26393",
  "lastModified": "2024-11-21T05:56:17.503",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-09T21:15:12.607",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-5001"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-401"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-13 16:30
Summary
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "F71B3286-B679-4DC0-BDD1-784AC5577094",
              "versionEndExcluding": "23.12.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49540C5D-CEC7-4BCB-882B-73843CAFD55A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "4397FD7C-3357-4F01-98F4-131000D23AA0",
              "versionEndIncluding": "23.q4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n inadecuada del \u00edndice de matriz en el firmware de administraci\u00f3n de energ\u00eda (PMFW) puede permitir que un atacante privilegiado provoque una lectura de memoria fuera de los l\u00edmites dentro de PMFW, lo que podr\u00eda provocar una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2023-31307",
  "lastModified": "2024-12-13T16:30:30.840",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 2.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 1.4,
        "source": "psirt@amd.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-13T17:15:20.500",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-129"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-129"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
              "versionEndExcluding": "21.q1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de comprobaci\u00f3n de puntero insuficiente en el controlador de gr\u00e1ficos AMD para Windows 10 puede conllevar a una escalada de privilegios o denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12985",
  "lastModified": "2024-11-21T05:00:37.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-11T22:15:11.507",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution ."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n inapropiada de par\u00e1metros en algunas aplicaciones confiable de la PSP contenida en AMD Graphics Driver puede permitir a un atacante local omitir las restricciones de seguridad y lograr una ejecuci\u00f3n de c\u00f3digo arbitrario"
    }
  ],
  "id": "CVE-2020-12929",
  "lastModified": "2024-11-21T05:00:33.343",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T16:15:09.433",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Summary
A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.
Impacted products
Vendor Product Version
amd radeon_software -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6678421F-CD05-445F-B114-293609732777",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure."
    },
    {
      "lang": "es",
      "value": "Un atacante podr\u00eda usar una aplicaci\u00f3n de usuario (UApp) o un cargador de arranque AGESA (ABL) maliciosos o comprometidos para extraer memoria arbitraria del cargador de arranque de la fase 2 de ASP, conllevando potencialmente a una divulgaci\u00f3n de informaci\u00f3n"
    }
  ],
  "id": "CVE-2021-26361",
  "lastModified": "2024-11-21T05:56:12.447",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-12T18:16:53.147",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Summary
A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.
Impacted products
Vendor Product Version
amd radeon_software -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6678421F-CD05-445F-B114-293609732777",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability."
    },
    {
      "lang": "es",
      "value": "Una UApp o ABL maliciosa o comprometida puede ser usada por un atacante para emitir una llamada al sistema malformada que resulte en el mapeo de registros confidenciales de System Management Network (SMN) conllevando a una p\u00e9rdida de integridad y disponibilidad"
    }
  ],
  "id": "CVE-2021-26362",
  "lastModified": "2024-11-21T05:56:12.600",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-12T18:16:53.183",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-12 18:16
Modified
2024-11-21 05:56
Summary
An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.
Impacted products
Vendor Product Version
amd radeon_software -
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3300g_firmware -
amd ryzen_3_3300g -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_5_3450g_firmware -
amd ryzen_5_3450g -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_threadripper_2920x_firmware -
amd ryzen_threadripper_2920x -
amd ryzen_threadripper_2950x_firmware -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2970wx_firmware -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2990wx_firmware -
amd ryzen_threadripper_2990wx -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6678421F-CD05-445F-B114-293609732777",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity."
    },
    {
      "lang": "es",
      "value": "Un atacante, que haya obtenido altos privilegios por alg\u00fan otro tipo de vulnerabilidad, puede ser capaz de leer los datos de la ROM de arranque, resultando en una p\u00e9rdida de la integridad del sistema"
    }
  ],
  "id": "CVE-2021-26366",
  "lastModified": "2024-11-21T05:56:13.280",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-12T18:16:53.217",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 16:15
Modified
2024-11-21 05:00
Summary
A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.
Impacted products
Vendor Product Version
amd radeon_software *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck."
    },
    {
      "lang": "es",
      "value": "Se presenta un problema potencial de denegaci\u00f3n de servicio en AMD Display driver Escape 0x130007 Call handler. Un atacante con bajo privilegio podr\u00eda inducir potencialmente un BugCheck de Windows"
    }
  ],
  "id": "CVE-2020-12920",
  "lastModified": "2024-11-21T05:00:32.737",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T16:15:09.380",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2025-02-13 17:15
Summary
Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.
Impacted products
Vendor Product Version
intel radeon_rx_vega_m_firmware *
intel core_i5-8305g -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel nuc_8_enthusiast_nuc8i7hnkqc -
intel nuc_8_enthusiast_nuc8i7hvkva -
intel nuc_8_enthusiast_nuc8i7hvkvaw -
intel nuc_kit_nuc8i7hnk -
intel nuc_kit_nuc8i7hvk -
amd radeon_software *
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_7600 -
amd radeon_rx_7600m -
amd radeon_rx_7600m_xt -
amd radeon_rx_7600s -
amd radeon_rx_7700_xt -
amd radeon_rx_7700s -
amd radeon_rx_7800_xt -
amd radeon_rx_7900_gre -
amd radeon_rx_7900_xt -
amd radeon_rx_7900_xtx -
amd radeon_rx_7900m -
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300 -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_pro_w7500 -
amd radeon_pro_w7600 -
amd radeon_pro_w7800 -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd radeon_pro_vega_56_firmware -
amd radeon_pro_vega_56 -
amd radeon_pro_vega_64_firmware -
amd radeon_pro_vega_64 -
amd radeon_software *
amd radeon_software *
amd ryzen_3_3015ce -
amd ryzen_3_3015e -
amd ryzen_3_4100 -
amd ryzen_3_4300g -
amd ryzen_3_4300ge -
amd ryzen_3_4300u -
amd ryzen_3_5300g -
amd ryzen_3_5300ge -
amd ryzen_3_5300u -
amd ryzen_5_4500 -
amd ryzen_5_4500u -
amd ryzen_5_4600g -
amd ryzen_5_4600ge -
amd ryzen_5_4600h -
amd ryzen_5_4600hs -
amd ryzen_5_4600u -
amd ryzen_5_4680u -
amd ryzen_5_5500h -
amd ryzen_5_5500u -
amd ryzen_5_5600g -
amd ryzen_5_5600ge -
amd ryzen_5_pro_3200g -
amd ryzen_5_pro_3200ge -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3400g -
amd ryzen_5_pro_3400ge -
amd ryzen_7_4700g -
amd ryzen_7_4700ge -
amd ryzen_7_4700u -
amd ryzen_7_4800h -
amd ryzen_7_4800hs -
amd ryzen_7_4980u -
amd ryzen_7_5700g -
amd ryzen_7_5700ge -
amd ryzen_7_5700u -
amd ryzen_9_4900h -
amd ryzen_9_4900hs -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4",
              "versionEndExcluding": "23.10.01.46",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A4CCCB-01CC-4488-9336-C0C379ABE609",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
              "versionEndExcluding": "23.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
              "versionEndExcluding": "23.q3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
              "versionEndExcluding": "23.7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
              "versionEndExcluding": "23.q3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service."
    },
    {
      "lang": "es",
      "value": "Una verificaci\u00f3n de l\u00edmites insuficiente en el ASP (AMD Secure Processor) puede permitir que un atacante acceda a la memoria fuera de los l\u00edmites de lo permitido para una TA (Trusted Application), lo que resulta en una posible denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2021-46748",
  "lastModified": "2025-02-13T17:15:34.023",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-14T19:15:10.267",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
              "versionEndExcluding": "21.q1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows 10 may cause arbitrary code execution in the kernel, leading to escalation of privilege or denial of service."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de comprobaci\u00f3n de puntero insuficiente en el controlador de gr\u00e1ficos AMD para Windows 10 puede causar la ejecuci\u00f3n de c\u00f3digo arbitrario en el kernel, lo que lleva a una escalada de privilegios o denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12986",
  "lastModified": "2024-11-21T05:00:37.113",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-11T22:15:11.540",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 19:15
Modified
2024-11-21 05:00
Summary
Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer de pila en AMD Graphics Driver para Windows 10 puede conllevar a una escalada de privilegios o una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12898",
  "lastModified": "2024-11-21T05:00:31.200",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T19:15:07.233",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-11-12 18:15
Modified
2024-11-27 16:20
Summary
Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "8B95FEA4-F26E-45B0-9663-CF6730DB8400",
              "versionEndExcluding": "24.6.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:cloud:*:*:*",
              "matchCriteriaId": "D3C200C2-56EB-4CD0-9EBF-D8D3BFE51CA5",
              "versionEndExcluding": "24.7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "3C8C56D8-EA82-4166-AC00-A8416DA471FC",
              "versionEndExcluding": "24.q2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software_for_hip:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "CB85FB48-9901-49CC-A2AA-47AFC6B134B4",
              "versionEndExcluding": "24.10.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution."
    },
    {
      "lang": "es",
      "value": "Los permisos predeterminados incorrectos en el directorio de instalaci\u00f3n del SDK AMD HIP podr\u00edan permitir que un atacante logre una escalada de privilegios que potencialmente resulte en la ejecuci\u00f3n de c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2024-21937",
  "lastModified": "2024-11-27T16:20:37.073",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 5.9,
        "source": "psirt@amd.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-11-12T18:15:17.863",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6015.html"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "psirt@amd.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 20:15
Modified
2024-11-21 05:00
Summary
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.
Impacted products
Vendor Product Version
amd radeon_software *
microsoft windows_10 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDEDBDCA-186A-4C76-B8C7-6A9978D29EA9",
              "versionEndExcluding": "20.11.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites en AMD Graphics Driver para Windows 10 en el escape 0x3004403 puede conllevar a una divulgaci\u00f3n de informaci\u00f3n arbitraria"
    }
  ],
  "id": "CVE-2020-12905",
  "lastModified": "2024-11-21T05:00:32.200",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T20:15:19.647",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*",
              "matchCriteriaId": "CCEDEE9C-091E-4D9B-94D3-2BB3B33B5766",
              "versionEndExcluding": "21.q1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "528B8908-B68E-40A1-9EB8-8EBD287DC8F2",
              "versionEndExcluding": "20.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An invalid object pointer free vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad sin puntero de objeto no v\u00e1lido en el controlador de gr\u00e1ficos AMD para Windows 10 puede conllevar a una escalada de privilegios o denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-12982",
  "lastModified": "2024-11-21T05:00:36.770",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-11T22:15:11.410",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-763"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2025-02-13 17:16
Summary
Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.
Impacted products
Vendor Product Version
intel radeon_rx_vega_m_firmware *
intel core_i5-8305g -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel nuc_8_enthusiast_nuc8i7hnkqc -
intel nuc_8_enthusiast_nuc8i7hvkva -
intel nuc_8_enthusiast_nuc8i7hvkvaw -
intel nuc_kit_nuc8i7hnk -
intel nuc_kit_nuc8i7hvk -
amd radeon_software *
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800m -
amd radeon_rx_6800s -
amd radeon_rx_6850m_xt -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_7600 -
amd radeon_rx_7600m -
amd radeon_rx_7600m_xt -
amd radeon_rx_7600s -
amd radeon_rx_7700_xt -
amd radeon_rx_7700s -
amd radeon_rx_7800_xt -
amd radeon_rx_7900_gre -
amd radeon_rx_7900_xt -
amd radeon_rx_7900_xtx -
amd radeon_rx_7900m -
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5500x -
amd radeon_pro_w5700 -
amd radeon_pro_w5700x -
amd radeon_pro_w6300 -
amd radeon_pro_w6300m -
amd radeon_pro_w6400 -
amd radeon_pro_w6500m -
amd radeon_pro_w6600 -
amd radeon_pro_w6600m -
amd radeon_pro_w6600x -
amd radeon_pro_w6800 -
amd radeon_pro_w6800x -
amd radeon_pro_w6800x_duo -
amd radeon_pro_w6900x -
amd radeon_pro_w7500 -
amd radeon_pro_w7600 -
amd radeon_pro_w7800 -
amd radeon_rx_vega_56_firmware -
amd radeon_rx_vega_56 -
amd radeon_rx_vega_64_firmware -
amd radeon_rx_vega_64 -
amd radeon_pro_vega_56_firmware -
amd radeon_pro_vega_56 -
amd radeon_pro_vega_64_firmware -
amd radeon_pro_vega_64 -
amd radeon_software *
amd radeon_software *
amd ryzen_3_3015ce -
amd ryzen_3_3015e -
amd ryzen_3_4100 -
amd ryzen_3_4300g -
amd ryzen_3_4300ge -
amd ryzen_3_4300u -
amd ryzen_3_5300g -
amd ryzen_3_5300ge -
amd ryzen_3_5300u -
amd ryzen_5_4500 -
amd ryzen_5_4500u -
amd ryzen_5_4600g -
amd ryzen_5_4600ge -
amd ryzen_5_4600h -
amd ryzen_5_4600hs -
amd ryzen_5_4600u -
amd ryzen_5_4680u -
amd ryzen_5_5500h -
amd ryzen_5_5500u -
amd ryzen_5_5600g -
amd ryzen_5_5600ge -
amd ryzen_5_pro_3200g -
amd ryzen_5_pro_3200ge -
amd ryzen_5_pro_3350g -
amd ryzen_5_pro_3350ge -
amd ryzen_5_pro_3400g -
amd ryzen_5_pro_3400ge -
amd ryzen_7_4700g -
amd ryzen_7_4700ge -
amd ryzen_7_4700u -
amd ryzen_7_4800h -
amd ryzen_7_4800hs -
amd ryzen_7_4980u -
amd ryzen_7_5700g -
amd ryzen_7_5700ge -
amd ryzen_7_5700u -
amd ryzen_9_4900h -
amd ryzen_9_4900hs -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:radeon_rx_vega_m_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "925E50A0-1CE1-4AAC-802F-D4060AC0DDA4",
              "versionEndExcluding": "23.10.01.46",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A4CCCB-01CC-4488-9336-C0C379ABE609",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
              "versionEndExcluding": "23.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB218988-1483-4D96-9075-F79EDBC79974",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
              "versionEndExcluding": "23.q3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8E9065-121A-4220-A631-3B3EB43B2AAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE2D18A-955A-4415-A5B2-18258C0277B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCC24F7-17CD-422A-B047-3E8B32D7B3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACFFECA-179B-4911-85DE-D7270610E4A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A9B2F1-D9C5-47F8-9B2D-7C2A1495972A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19588B3D-3F44-4127-8989-B535D4391201",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1BC3034-8C33-4AAF-BE81-9BCFBF0EE56A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "697BB742-0A55-4165-B5BD-5BDCD67B62CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14599A66-17C9-4072-AA0D-EAE86DB496DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C296FBE4-A7CB-45CC-866F-9287CB2C4CD3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F9458D-7D2E-4664-A896-F1FB1907226F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_rx_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "326A62D7-A59F-4577-A7C4-956E83B5F80E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1781E1-CA76-4C8F-AAA5-FA2E0484C41A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_pro_vega_56_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52880029-7A09-47F5-84B9-7A8A77D883F7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_vega_56:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2819B30C-7A03-4A3B-8D34-080A85E83AE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:radeon_pro_vega_64_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40A38A14-D45C-4746-BCDC-D26D178B1426",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_vega_64:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D89E1B8-509D-428E-984C-E23D808A0006",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "538C0130-93FA-4B41-96CE-FEEC462A1135",
              "versionEndExcluding": "23.7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "DA638E10-5A0F-43D5-BC26-5A18C987D467",
              "versionEndExcluding": "23.q3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3015ce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6513418A-C422-4C3B-8C5A-C1DB4BAC67C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3015e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7774C021-B18A-473A-90B5-48A95071E5BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263E53BD-7A57-40AC-8A35-D761BD3895A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE3D939-DA9A-4B78-AEBA-8C30AA7E9354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "510FB098-A28C-46AD-9244-438DC828A007",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A4079E-01E9-4807-A293-F6E843752554",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C443EB-CF9B-4B50-A0F2-CD652D5E1467",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9048FE84-62DA-4C1F-9EF2-0E94A10D116F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3200ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D111819-345A-4BAF-83D0-1153209AFCEB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "444F83B8-ABD0-401C-8028-CAF0DEECF7BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1622E6AD-CF6D-4C69-BAA6-BD5A2E658639",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution."
    },
    {
      "lang": "es",
      "value": "La verificaci\u00f3n inadecuada de la firma del controlador RadeonTM RX Vega M Graphics para Windows puede permitir que un atacante con privilegios de administrador inicie AMDSoftwareInstaller.exe sin validar la firma del archivo, lo que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2023-20567",
  "lastModified": "2025-02-13T17:16:01.443",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-14T19:15:15.880",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00971.html"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-347"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-15 19:15
Modified
2024-11-21 05:00
Summary
An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3017A2C8-6079-4639-952E-E895FB6CB9A2",
              "versionEndExcluding": "21.3.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
              "matchCriteriaId": "084984D5-D241-497B-B118-50C6C1EAD468",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
              "matchCriteriaId": "BA592626-F17C-4F46-823B-0947D102BBD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution."
    },
    {
      "lang": "es",
      "value": "Una ruta de b\u00fasqueda no confiable en el instalador de configuraci\u00f3n de AMD Radeon puede conllevar a una escalada de privilegios o una ejecuci\u00f3n de c\u00f3digo no autorizada"
    }
  ],
  "id": "CVE-2020-12892",
  "lastModified": "2024-11-21T05:00:30.540",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-15T19:15:07.187",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-426"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-08 18:15
Modified
2024-11-21 07:41
Severity ?
Summary
A potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations
Impacted products
Vendor Product Version
amd radeon_software -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:-:*:*:*:crimson_relive:*:*:*",
              "matchCriteriaId": "1B9B57CB-1D5E-4FE9-B03D-315A9B54650A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nA potential vulnerability was reported in Radeon\u2122 Software Crimson ReLive Edition which may allow escalation of privilege. Radeon\u2122 Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
    }
  ],
  "id": "CVE-2023-20586",
  "lastModified": "2024-11-21T07:41:10.223",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-08T18:15:11.593",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6007"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-17 14:15
Modified
2024-11-21 07:41
Summary
An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.
Impacted products
Vendor Product Version
amd radeon_software *
amd radeon_rx_5300 -
amd radeon_rx_5300_xt -
amd radeon_rx_5300m -
amd radeon_rx_5500 -
amd radeon_rx_5500_xt -
amd radeon_rx_5500m -
amd radeon_rx_5600 -
amd radeon_rx_5600_xt -
amd radeon_rx_5600m -
amd radeon_rx_5700 -
amd radeon_rx_5700_xt -
amd radeon_rx_5700m -
amd radeon_rx_6300m -
amd radeon_rx_6400 -
amd radeon_rx_6450m -
amd radeon_rx_6500_xt -
amd radeon_rx_6500m -
amd radeon_rx_6550m -
amd radeon_rx_6550s -
amd radeon_rx_6600 -
amd radeon_rx_6600_xt -
amd radeon_rx_6600m -
amd radeon_rx_6600s -
amd radeon_rx_6650_xt -
amd radeon_rx_6650m -
amd radeon_rx_6650m_xt -
amd radeon_rx_6700 -
amd radeon_rx_6700_xt -
amd radeon_rx_6700m -
amd radeon_rx_6700s -
amd radeon_rx_6750_gre_10gb -
amd radeon_rx_6750_gre_12gb -
amd radeon_rx_6750_xt -
amd radeon_rx_6800 -
amd radeon_rx_6800_xt -
amd radeon_rx_6800s -
amd radeon_rx_6900_xt -
amd radeon_rx_6950_xt -
amd radeon_rx_7600 -
amd radeon_rx_7600m -
amd radeon_rx_7600m_xt -
amd radeon_rx_7600s -
amd radeon_rx_7700_xt -
amd radeon_rx_7700s -
amd radeon_rx_7800_xt -
amd radeon_rx_7900_gre -
amd radeon_rx_7900_xt -
amd radeon_rx_7900_xtx -
amd radeon_rx_7900m -
amd radeon_software *
amd radeon_pro_w5500 -
amd radeon_pro_w5700 -
amd radeon_pro_w6300 -
amd radeon_pro_w6400 -
amd radeon_pro_w6600 -
amd radeon_pro_w6800 -
amd radeon_pro_w7500 -
amd radeon_pro_w7600 -
amd radeon_pro_w7800 -
amd radeon_pro_w7900 -
amd radeon_software *
amd radeon_software *
amd ryzen_3_7320u -
amd ryzen_3_7335u -
amd ryzen_3_7440u -
amd ryzen_5_6600h -
amd ryzen_5_6600hs -
amd ryzen_5_6600u -
amd ryzen_5_7500f -
amd ryzen_5_7520u -
amd ryzen_5_7535hs -
amd ryzen_5_7535u -
amd ryzen_5_7540u -
amd ryzen_5_7600 -
amd ryzen_5_7600x -
amd ryzen_5_7640h -
amd ryzen_5_7640u -
amd ryzen_5_7645hx -
amd ryzen_5_pro_7640hs -
amd ryzen_5_pro_7645 -
amd ryzen_7_6800h -
amd ryzen_7_6800hs -
amd ryzen_7_6800u -
amd ryzen_7_7700 -
amd ryzen_7_7700x -
amd ryzen_7_7735hs -
amd ryzen_7_7735u -
amd ryzen_7_7736u -
amd ryzen_7_7745hx -
amd ryzen_7_7800x3d -
amd ryzen_7_7840h -
amd ryzen_7_7840u -
amd ryzen_7_pro_7745 -
amd ryzen_7_pro_7840hs -
amd ryzen_9_6900hs -
amd ryzen_9_6900hx -
amd ryzen_9_6980hs -
amd ryzen_9_6980hx -
amd ryzen_9_7845hx -
amd ryzen_9_7900 -
amd ryzen_9_7900x -
amd ryzen_9_7900x3d -
amd ryzen_9_7940h -
amd ryzen_9_7945hx -
amd ryzen_9_7945hx3d -
amd ryzen_9_7950x -
amd ryzen_9_7950x3d -
amd ryzen_9_pro_7940hs -
amd ryzen_9_pro_7945 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "7162DB91-6B5C-4575-A8D0-B83B34908BE5",
              "versionEndExcluding": "23.9.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9995FBE-D440-45BA-86B5-1CFADF5BEE2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6289D311-1997-47E7-B8D9-75C27CD0B9D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02AA337B-595F-4859-A82A-DEC7BB346773",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7F0F81-2896-4E79-AC16-EA6AA9EBE7B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08BE928-65AA-4E21-A8F0-D013C8FFB693",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1952152-A184-4FC9-B1CC-008B8238B5ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3B2BEAF-AA1F-414D-A3DF-348B1033CAC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D51EA58C-3684-4567-A213-9351F2E521B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0026781-F1DA-4533-870E-BCA14CFC7005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B8E08F-2DAC-41CF-9105-D9A4FDDEE19A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB84A38-F651-44CB-93EF-502F1A197FBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CEDC946-3685-4533-8D97-BDBDFB7AACBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C66880A-FB33-477D-93FD-C280A4547D66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD3F898-5AB1-4E60-A086-ADCF33820154",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "863770A0-3A7F-43E3-98E5-77E42827FA6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4FED1D5-F31A-44C9-9101-D70486CC6FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB12B48-ABF8-4FFB-BD4E-6413C34D477B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D1C027-56B1-4EA7-842B-09B300B17808",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C24DE61-4036-42BF-A08F-67C234706703",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D9040F-1D1D-49E5-A60E-4393F5D76B60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76A792F-7026-4F29-9A00-3A2EAB2DE5FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33DAF63F-C468-438C-97C3-B6CE8BD12858",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82D4745-ACAB-4FC2-A63D-3B0FEA208BED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD80D674-1DD4-44E0-8C38-8341A7F392B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10DD7029-9299-4901-A3D1-84D6102471B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F73C59A-CDE2-4203-921F-1831D4ACFD2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C980129B-D717-47F7-A6C1-5EB64FB1BF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76C585C-FCC8-456D-A63C-7A769AF5EB07",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre_10gb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BB37AAC-3957-4840-B47E-ED678F0B6044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_gre_12gb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA1DA067-DE94-4663-91CD-A70CC386D45A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466279D-0582-464E-AFCC-20872CC99B56",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12EF0B24-689D-4BE8-98D5-D88A84D5E473",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14D5A16-F7BE-427A-98AB-2E120DB756DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFC4A007-BEFD-4BF0-A176-7ECD6150041C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "838BCF03-8959-4B8F-96B2-416B880F33DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04102F65-DAA8-4E0A-88EF-44BAA8B4AAA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600m_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D5FFA6-9D23-4C95-B23D-F50EB60369CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7600s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A82AB49-3ABB-4DE4-91DB-4AF8E1F3196E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7700_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "730BD289-75E3-4365-A0C1-D0AD1498F3C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A2E6B9-ADFB-4790-917B-9679CFE280E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7800_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "334FD5E4-BA45-42BA-B1EC-0DC1E1F44018",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6B0E69-D944-48CF-A3F3-EA350C1451AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EDBF76B-3C2E-4421-800B-54CE6A997439",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900_xtx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B69860-0C6F-40AD-8696-6150365D908F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_rx_7900m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BFE5253-2401-4EE4-90E7-9459F2A93CF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "2841E9B4-728C-4201-AAF1-3250A1DC08F3",
              "versionEndExcluding": "23.q4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D5FA49-D783-4DA5-AAED-F3BE3B4DA16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39052CC-CC5F-4782-9CCE-2F5C8342AD79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E68F7E-0A57-498A-9DB9-3D36045D671E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91262-2EF4-4F0D-8B61-0012BD25E7A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3083C065-5A2C-4B2D-9C1F-5793BA3C0A52",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7557738A-5D93-4117-8FF2-9A27CD0E6BC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED51D4C-2C19-4C3B-814C-3F88AF25870C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "233155D5-D0D9-4EC3-B7F7-2CB3F30E48A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B858C0-0490-4D50-BC1E-FFB5A54E5DBC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:radeon_pro_w7900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFF5CD86-64D3-4F02-9971-AC50E8052986",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*",
              "matchCriteriaId": "7162DB91-6B5C-4575-A8D0-B83B34908BE5",
              "versionEndExcluding": "23.9.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*",
              "matchCriteriaId": "2841E9B4-728C-4201-AAF1-3250A1DC08F3",
              "versionEndExcluding": "23.q4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F04B9F-8C65-476B-B5D8-18CC96E3B712",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495E436C-B0EE-4B72-AB49-332F4752C140",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4FDE72-050C-4A72-A4F4-9C1D5273CADD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D260012-5D8F-4B36-8B88-82DB0291EE9D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B34AD7A-1C4A-4A4B-87EA-B7BE207F2E67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "025E494E-953E-426E-BE89-6F2360A3AAC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1232B034-1214-4F9A-823D-DC76D5C5956B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0870FBE4-92B4-4717-88B0-EC1094268034",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE36D471-57BF-4385-A825-029F7313E4DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "082BE536-F29C-4A73-B030-A19DD3A448B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7540u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36699723-8BD8-4D9F-B5E1-DE7ACF9A6D57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6740A06F-4512-427D-9CB9-A4A6DB046BA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C05D51F-469D-487D-9FC8-E1AD699A6F74",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBC1EFF4-FED3-4583-84D3-E7BFC1FE53B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7640u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC5E111-A7AA-4A45-A2E3-47013F9135D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5D5B25-F32A-493E-BD54-57098981E15A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E3657C6-1047-4CA9-8D44-C7143F7D877D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2787C72-42D5-42B0-BE5B-E548B319BCF4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09B085FF-EAEA-42BC-BA60-3AA9B76141B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "760F20CC-9034-462C-A25E-C009E2218C38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2CBCEA-AB4F-444C-9CCD-A976003F796C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76121981-8DC2-4779-833E-4B15CFCF7FC3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "225E8405-04FF-4885-92C8-8581ACC66E06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E5A8E7A-3430-41B9-8B3C-D9D462A2CEC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9171F4-F05E-4183-91BB-8DAD0A5EB0D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D50E8EA-ECB2-463D-BA51-D13CF5A02266",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69289284-2ED2-4D8B-8AE2-B835AAF31EAD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6CD984-A8C7-4B23-8FF9-896C503EBA37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2D0429F-F186-4F78-9AE0-574E3A39926D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_7840u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6C9E9BB-CD95-4D1E-914C-B705C1B0D8B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00DEBFA8-6007-4EAE-AD11-6D477ADE4E63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8480A7E0-882C-4B03-ADBC-697304B0B7C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA29FE4D-C9A2-46FB-8EC5-3067F56ED080",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "528D6AB3-01D9-41F1-90A7-FF5ADF66D4CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B21FB338-F944-40F9-8F0C-99B471AAD51E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3674D656-9623-4B39-AADE-158FE70FF29F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD27234D-ACFC-4144-8980-2B706822C579",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5602B902-9FDB-4946-BE4C-236262285F2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA666DF3-C5F3-4127-A8EE-B784DD41F642",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86CAA682-9666-4929-B1AC-D9DB3109DB1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A7E6806-A7AC-4C96-960B-B8934CEA2439",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74DD4A40-B712-4B54-9CC7-0BFD79E917BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CCEE11-392D-4486-A6AD-CB64FB8B7081",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD6C7D37-C94B-4301-8C0A-5A00B3569D6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F05C8669-6348-4A1B-B1D4-D22022E1F67E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7940hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "018A02C9-2A5C-43E2-8CCD-4D03C119C22B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DE32CA-168F-4812-AEAE-D771EB01E15D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\n\n\nAn improper privilege management in the AMD Radeon\u2122\u00a0Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution.\n\n\n\n"
    },
    {
      "lang": "es",
      "value": "Una gesti\u00f3n de privilegios inadecuada en el controlador de gr\u00e1ficos AMD Radeon\u2122 puede permitir que un atacante autenticado cree una solicitud IOCTL para obtener control de E/S sobre puertos de hardware o direcciones f\u00edsicas arbitrarias, lo que resulta en una posible ejecuci\u00f3n de c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2023-20598",
  "lastModified": "2024-11-21T07:41:12.177",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-10-17T14:15:09.813",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-6009"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}