Lucene search

K
cve[email protected]CVE-2021-26384
HistoryJul 14, 2022 - 8:15 p.m.

CVE-2021-26384

2022-07-1420:15:08
CWE-787
CWE-125
web.nvd.nist.gov
51
8
cve-2021-26384
smi
system management interface
memory corruption
out-of-bounds
nvd

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

A malformed SMI (System Management Interface) command may allow an attacker to establish a corrupted SMI Trigger Info data structure, potentially leading to out-of-bounds memory reads and writes when triggering an SMI resulting in a potential loss of resources.

Affected configurations

NVD
Node
amdryzen_7_5700g_firmwareRange<comboam4_v2_pi_1.2.0.6c
AND
amdryzen_7_5700gMatch-
Node
amdryzen_7_5700ge_firmwareRange<comboam4_v2_pi_1.2.0.6c
AND
amdryzen_7_5700geMatch-
Node
amdryzen_5_5600g_firmwareRange<comboam4_v2_pi_1.2.0.6c
AND
amdryzen_5_5600gMatch-
Node
amdryzen_5_5600ge_firmwareRange<comboam4_v2_pi_1.2.0.6c
AND
amdryzen_5_5600geMatch-
Node
amdryzen_3_5300g_firmwareRange<comboam4_v2_pi_1.2.0.6c
AND
amdryzen_3_5300gMatch-
Node
amdryzen_3_5300ge_firmwareRange<comboam4_v2_pi_1.2.0.6c
AND
amdryzen_3_5300geMatch-
Node
amdryzen_9_5980hx_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5980hxMatch-
Node
amdryzen_9_5980hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5980hsMatch-
Node
amdryzen_7_5825u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5825uMatch-
Node
amdryzen_9_5900hx_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5900hxMatch-
Node
amdryzen_9_5900hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5900hsMatch-
Node
amdryzen_7_5825c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5825cMatch-
Node
amdryzen_7_5800h_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5800hMatch-
Node
amdryzen_5_5625u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5625uMatch-
Node
amdryzen_7_5800hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5800hsMatch-
Node
amdryzen_5_5625c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5625cMatch-
Node
amdryzen_5_5600h_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5600hMatch-
Node
amdryzen_5_5600hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5600hsMatch-
Node
amdryzen_7_5800u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5800uMatch-
Node
amdryzen_5_5600u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5600uMatch-
Node
amdryzen_5_5560u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5560uMatch-
Node
amdryzen_3_5425u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5425uMatch-
Node
amdryzen_3_5425c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5425cMatch-
Node
amdryzen_3_5400u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5400uMatch-
Node
amdryzen_3_5125c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5125cMatch-
Node
amdathlon_silver_3050u_firmwareMatch-
AND
amdathlon_silver_3050uMatch-
Node
amdathlon_gold_3150u_firmwareMatch-
AND
amdathlon_gold_3150uMatch-
Node
amdryzen_3_3200u_firmwareMatch-
AND
amdryzen_3_3200uMatch-
Node
amdryzen_3_3250u_firmwareMatch-
AND
amdryzen_3_3250uMatch-
Node
amdryzen_3_3300u_firmwareMatch-
AND
amdryzen_3_3300uMatch-
Node
amdryzen_3_3350u_firmwareMatch-
AND
amdryzen_3_3350uMatch-
Node
amdryzen_3_3450u_firmwareMatch-
AND
amdryzen_3_3450uMatch-
Node
amdryzen_3_3500u_firmwareMatch-
AND
amdryzen_3_3500uMatch-
Node
amdryzen_3_3500c_firmwareMatch-
AND
amdryzen_3_3500cMatch-
Node
amdryzen_3_3550h_firmwareMatch-
AND
amdryzen_3_3550hMatch-
Node
amdryzen_3_3580u_firmwareMatch-
AND
amdryzen_3_3580uMatch-
Node
amdryzen_3_3700u_firmwareMatch-
AND
amdryzen_3_3700uMatch-
Node
amdryzen_3_3700c_firmwareMatch-
AND
amdryzen_3_3700cMatch-
Node
amdryzen_3_3750h_firmwareMatch-
AND
amdryzen_3_3750hMatch-
Node
amdryzen_3_3780u_firmwareMatch-
AND
amdryzen_3_3780uMatch-
Node
amdryzen_3_2200u_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_3_2200uMatch-
Node
amdryzen_3_2300u_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_3_2300uMatch-
Node
amdryzen_5_2500u_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_5_2500uMatch-
Node
amdryzen_5_2600_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_5_2600Match-
Node
amdryzen_5_2600h_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_5_2600hMatch-
Node
amdryzen_5_2600x_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_5_2600xMatch-
Node
amdryzen_5_2700_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_5_2700Match-
Node
amdryzen_5_2700x_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_5_2700xMatch-
Node
amdryzen_7_2700_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_7_2700Match-
Node
amdryzen_7_2700u_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_7_2700uMatch-
Node
amdryzen_7_2700x_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_7_2700xMatch-
Node
amdryzen_7_2800h_firmwareRange<comboam4v2_pi_1.2.0.6c
AND
amdryzen_7_2800hMatch-

CNA Affected

[
  {
    "product": "Ryzenโ„ข Series ",
    "vendor": "AMD",
    "versions": [
      {
        "status": "affected",
        "version": "various"
      }
    ]
  },
  {
    "product": " Athlonโ„ข Series ",
    "vendor": "AMD",
    "versions": [
      {
        "status": "affected",
        "version": "various"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Related for CVE-2021-26384