Lucene search

K
cve[email protected]CVE-2021-26382
HistoryJul 14, 2022 - 8:15 p.m.

CVE-2021-26382

2022-07-1420:15:08
web.nvd.nist.gov
70
10
cve-2021-26382
attacker
root account
privileges
signed firmware
acp
denial of service
nvd

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

5.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

An attacker with root account privileges can load any legitimately signed firmware image into the Audio Co-Processor (ACP,) irrespective of the respective signing key being declared as usable for authenticating an ACP firmware image, potentially resulting in a denial of service.

Affected configurations

NVD
Node
amdryzen_7_5700gMatch-
AND
amdryzen_7_5700g_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_7_5700geMatch-
AND
amdryzen_7_5700ge_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_5_5600gMatch-
AND
amdryzen_5_5600g_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_5_5600geMatch-
AND
amdryzen_5_5600ge_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_3_5300gMatch-
AND
amdryzen_3_5300g_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_3_5300geMatch-
AND
amdryzen_3_5300ge_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_9_5980hx_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5980hxMatch-
Node
amdryzen_9_5980hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5980hsMatch-
Node
amdryzen_7_5825u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5825uMatch-
Node
amdryzen_9_5900hx_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5900hxMatch-
Node
amdryzen_9_5900hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5900hsMatch-
Node
amdryzen_7_5825c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5825cMatch-
Node
amdryzen_7_5800h_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5800hMatch-
Node
amdryzen_5_5625u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5625uMatch-
Node
amdryzen_7_5800hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5800hsMatch-
Node
amdryzen_5_5625c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5625cMatch-
Node
amdryzen_5_5600h_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5600hMatch-
Node
amdryzen_5_5600hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5600hsMatch-
Node
amdryzen_7_5800u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5800uMatch-
Node
amdryzen_5_5600u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5600uMatch-
Node
amdryzen_5_5560u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5560uMatch-
Node
amdryzen_3_5425u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5425uMatch-
Node
amdryzen_3_5425c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5425cMatch-
Node
amdryzen_3_5400u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5400uMatch-
Node
amdryzen_3_5125c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5125cMatch-
Node
amdryzen_3_3200u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_3_3200uMatch-
Node
amdryzen_3_3250u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_3_3250uMatch-
Node
amdryzen_3_3300u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_3_3300uMatch-
Node
amdryzen_5_3500u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_5_3500uMatch-
Node
amdryzen_5_3550h_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_5_3550hMatch-
Node
amdryzen_5_3580u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_5_3580uMatch-
Node
amdryzen_7_3700u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_7_3700uMatch-
Node
amdryzen_7_pro_3700u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_7_pro_3700uMatch-
Node
amdryzen_7_3750h_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_7_3750hMatch-
Node
amdryzen_7_3780u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_7_3780uMatch-

CNA Affected

[
  {
    "product": "Ryzenโ„ข Series ",
    "vendor": "AMD",
    "versions": [
      {
        "status": "affected",
        "version": "various"
      }
    ]
  },
  {
    "product": " Athlonโ„ข Series ",
    "vendor": "AMD",
    "versions": [
      {
        "status": "affected",
        "version": "various"
      }
    ]
  }
]

Social References

More

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

5.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Related for CVE-2021-26382