Lucene search

K
cveAMDCVE-2022-23817
HistoryAug 13, 2024 - 5:15 p.m.

CVE-2022-23817

2024-08-1317:15:18
CWE-120
AMD
web.nvd.nist.gov
23
asp secure os
memory buffer checking
privilege escalation
cve-2022-23817

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

9.5%

Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space, potentially leading to privilege escalation.

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 3000 Series Desktop Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "ComboAM4V1  1.0.0.A/ComboAM4V2  1.2.0.9"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 5000 Series Desktop Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "ComboAM4v2 PI 1.2.0.8"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "ComboAM4v2 PI 1.2.0.8"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 7000 Series Desktop Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "ComboAM5  1.0.8.0"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "ComboAM4PI  1.0.0.9"
      },
      {
        "status": "unaffected",
        "version": "ComboAM4v2 PI 1.2.0.8"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "ComboAM4v2 PI 1.2.0.8"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ Threadripper™ 3000 Series Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "CastlePeakPI-SP3r3  1.0.0.8"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "ChagallWSPI-sWRX8  1.0.0.5"
      },
      {
        "status": "unaffected",
        "version": "CastlePeakWSPI-sWRX8  1.0.0.A"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ Threadripper™ PRO 5000WX Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "ChagallWSPI-sWRX8  1.0.0.5"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Athlon™ 3000 Series Mobile  Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "PicassoPI-FP5  1.0.0.E"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Athlon™ 3000 Series Mobile  Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "PollockPI-FT5  1.0.0.4"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "PicassoPI-FP5  1.0.0.E"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "RenoirPI-FP6  1.0.0.A"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "CezannePI-FP6 1.0.0.C"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "CezannePI-FP6  1.0.0.C"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "RembrandtPI-FP7 1.0.0.5"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "RembrandtPI-FP7 1.0.0.5"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "CezannePI-FP6 1.0.0.C"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "CezannePI-FP6 1.0.0.C"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ 7045 Series Mobile Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "DragonRangeFL1PI 1.0.0.3b"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ Embedded R1000 Series Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "EmbeddedPI-FP5  1.2.0.A"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ Embedded R2000 Series Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "EmbeddedR2KPI-FP5 1.0.0.2"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ Embedded 5000 Series Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "EmbAM4PI  1.0.0.2"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ Embedded 7000 Series Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "EmbeddedAM5PI  1.0.0.0"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ Embedded V1000 Series Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "EmbeddedPI-FP5 1.2.0.A"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ Embedded V2000 Series Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "EmbeddedPI-FP6 1.0.0.8"
      }
    ]
  },
  {
    "defaultStatus": "affected",
    "product": "AMD Ryzen™ Embedded V3000 Series Processors",
    "vendor": "AMD",
    "versions": [
      {
        "status": "unaffected",
        "version": "EmbeddedPI-FP7r2 1.0.0.2"
      }
    ]
  }
]

CVSS3

7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

9.5%

Related for CVE-2022-23817