Lucene search

K
cveAMDCVE-2021-26360
HistoryNov 09, 2022 - 9:15 p.m.

CVE-2021-26360

2022-11-0921:15:11
AMD
web.nvd.nist.gov
46
4
cve-2021-26360
local access
system
unauthorized modifications
security configuration
soc registers
amd
secure processor
encrypted memory
arbitrary code execution

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.

Affected configurations

Nvd
Node
amdradeon_pro_w6300mMatch-
OR
amdradeon_pro_w6400Match-
OR
amdradeon_pro_w6500mMatch-
OR
amdradeon_pro_w6600Match-
OR
amdradeon_pro_w6600mMatch-
OR
amdradeon_pro_w6600xMatch-
OR
amdradeon_pro_w6800Match-
OR
amdradeon_pro_w6800xMatch-
OR
amdradeon_pro_w6800x_duoMatch-
OR
amdradeon_pro_w6900xMatch-
OR
amdradeon_rx_6300mMatch-
OR
amdradeon_rx_6400Match-
OR
amdradeon_rx_6500_xtMatch-
OR
amdradeon_rx_6500mMatch-
OR
amdradeon_rx_6600Match-
OR
amdradeon_rx_6600_xtMatch-
OR
amdradeon_rx_6600mMatch-
OR
amdradeon_rx_6600sMatch-
OR
amdradeon_rx_6650_xtMatch-
OR
amdradeon_rx_6650mMatch-
OR
amdradeon_rx_6650m_xtMatch-
OR
amdradeon_rx_6700Match-
OR
amdradeon_rx_6700_xtMatch-
OR
amdradeon_rx_6700mMatch-
OR
amdradeon_rx_6700sMatch-
OR
amdradeon_rx_6750_xtMatch-
OR
amdradeon_rx_6800Match-
OR
amdradeon_rx_6800_xtMatch-
OR
amdradeon_rx_6800mMatch-
OR
amdradeon_rx_6800sMatch-
OR
amdradeon_rx_6850m_xtMatch-
OR
amdradeon_rx_6900_xtMatch-
OR
amdradeon_rx_6950_xtMatch-
AND
amdenterprise_driverRange<22.10.20
OR
amdradeon_pro_softwareRange<22.q2enterprise
OR
amdradeon_softwareRange<22.5.2
VendorProductVersionCPE
amdradeon_pro_w6300m-cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*
amdradeon_pro_w6400-cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
amdradeon_pro_w6500m-cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*
amdradeon_pro_w6600-cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
amdradeon_pro_w6600m-cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*
amdradeon_pro_w6600x-cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*
amdradeon_pro_w6800-cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
amdradeon_pro_w6800x-cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*
amdradeon_pro_w6800x_duo-cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*
amdradeon_pro_w6900x-cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 361

CNA Affected

[
  {
    "vendor": "AMD",
    "product": "AMD Radeon RX 6000 Series & PRO W6000 Series",
    "versions": [
      {
        "version": "AMD Radeon Software",
        "status": "affected",
        "lessThan": "22.5.2",
        "versionType": "custom"
      },
      {
        "version": "AMD Radeon Pro Software Enterprise",
        "status": "affected",
        "lessThan": "22.Q2",
        "versionType": "custom"
      },
      {
        "version": "Enterprise Driver",
        "status": "affected",
        "lessThan": "22.10.20",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for CVE-2021-26360