Lucene search

K
hpHP Product Security Response TeamHPSBHF03885
HistoryNov 21, 2023 - 12:00 a.m.

AMD Graphics Driver November 2023 Security Update

2023-11-2100:00:00
HP Product Security Response Team
support.hp.com
10
amd
graphics driver
security update
potential vulnerabilities
windows
arbitrary code execution
denial of service
update
hp
affected platforms
softpaqs
mitigate

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.3 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.1%

AMD has informed HP of potential vulnerabilities identified in some AMD Graphics Drivers for Windows which may allow arbitrary code execution or denial of service.

AMD has released updates to mitigate the potential vulnerabilities. HP has identified affected platforms and corresponding SoftPaqs with minimum versions that mitigate the potential vulnerabilities. See the affected platforms listed below.

Affected configurations

Vulners
Node
hphp_probook_fortis_14_inch_g10Range<31.0.21018.9001
OR
hphp_14_inch_laptop_pc_14-ep1xxxRange<31.0.21018.9001
OR
hphp_15.6_inch_laptop_pc_15-fd1xxxRange<31.0.21018.9001
OR
hphp_15.6_inch_laptop_pc_15-fd1xxxRange<31.0.21018.9001
OR
hphp_elitebook_735_g6Range<31.0.21018.9001
OR
hphp_elitebook_745_g6Range<31.0.21018.9001
OR
hphp_elitebook_835_g7Range<31.0.21018.9001
OR
hphp_elitebook_835_g7Range<31.0.21018.9001
OR
hphp_elitebook_835_g8Range<31.0.21018.9001
OR
hphp_elitebook_845_g7Range<31.0.21018.9001
OR
hphp_elitebook_845_g7Range<31.0.21018.9001
OR
hphp_elitebook_845_g8Range<31.0.21018.9001
OR
hphp_elitebook_855_g7Range<31.0.21018.9001
OR
hphp_elitebook_855_g8Range<31.0.21018.9001
OR
hphp_pavilion_plus_16_inch_laptop_pc_16-ab1xxxRange<31.0.21018.9001
OR
hphp_pro_x360_fortis_11_inch_g10Range<31.0.21018.9001
OR
hphp_probook_x360_435_g7Range<31.0.21018.9001
OR
hphp_probook_fortis_14_inch_g10Range<31.0.21018.9001
OR
hphp_probook_445_g6Range<31.0.21018.9001
OR
hphp_probook_445_g7Range<31.0.21018.9001
OR
hphp_probook_445_g8Range<31.0.21018.9001
OR
hphp_probook_445r_g6Range<31.0.21018.9001
OR
hphp_probook_fortis_14_inch_g10Range<31.0.21018.9001
OR
hphp_probook_455_g4Range<31.0.21018.9001
OR
hphp_probook_455_g7Range<31.0.21018.9001
OR
hphp_probook_455_g8Range<31.0.21018.9001
OR
hphp_probook_455r_g6Range<31.0.21018.9001
OR
hphp_probook_635_aero_g7Range<31.0.21018.9001
OR
hphp_probook_635_aero_g8Range<31.0.21018.9001
OR
hphp_probook_x360_435_g7Range<31.0.21018.9001
OR
hphp_probook_x360_435_g8Range<31.0.21018.9001
OR
hphp_zbook_fury_15_g7Range<31.0.21018.9001
OR
hphp_zbook_fury_15.6_inch_g8_mobile_workstation_pcRange<31.0.21018.9001
OR
hphp_zbook_fury_16_g10_mobile_workstation_pcRange<31.0.21018.9001
OR
hphp_zbook_fury_17_g7Range<31.0.21018.9001
OR
hphp_zbook_fury_17.3_inch_g8_mobile_workstation_pcRange<31.0.21018.9001
OR
hphp_zhan_66_pro_14_g2Range<31.0.21018.9001
OR
hphp_zhan_66_pro_14_g4Range<31.0.21018.9001
OR
hphp_zhan_66_pro_14_inch_g5Range<31.0.21018.9001
OR
hphp_prodesk_600_g2_desktop_mini_pcRange<31.0.21024.8001
OR
hphp_elitedesk_800_g5_desktop_mini_pcRange<31.0.21024.8001
OR
hphp_z1_g8_tower_desktop_pcRange<31.0.21024.8001
OR
hphp_z1_g8_tower_desktop_pcRange<31.0.21024.8001
OR
hphp_elitedesk_800_g4_tower_pcRange<31.0.21024.8001
OR
hphp_elitedesk_880_g4_tower_pcRange<31.0.21024.8001
OR
hphp_elitedesk_705_g5_desktop_mini_pcRange<31.0.21024.5
OR
hphp_elitedesk_705_g5_small_form_factor_pcRange<31.0.21024.5
OR
hphp_elitedesk_805_g6_desktop_mini_pcRange<31.0.21024.5
OR
hphp_elitedesk_805_g6_small_form_factor_pcRange<31.0.21024.5
OR
hphp_elitedesk_805_g8_desktop_mini_pcRange<31.0.21024.5
OR
hphp_elitedesk_805_g8_small_form_factor_pcRange<31.0.21024.5
OR
hphp_eliteone_800_g6_24_all-in-one_pcRange<31.0.21024.8001
OR
hphp_eliteone_800_g6_27_all-in-one_pcRange<31.0.21024.8001
OR
hphp_desktop_pro_microtower_pcRange<31.0.21024.8001
OR
hphp_z1_g8_tower_desktop_pcRange<31.0.21024.8001
OR
hphp_z1_g8_tower_desktop_pcRange<31.0.21024.8001
OR
hphp_prodesk_405_g6_desktop_mini_pcRange<31.0.21024.5
OR
hphp_prodesk_405_g6_small_form_factor_pcRange<31.0.21024.5
OR
hphp_prodesk_405_g8_desktop_mini_pcRange<31.0.21024.5
OR
hphp_prodesk_405_g8_small_form_factor_pcRange<31.0.21024.5
OR
hphp_23.8_inch_all-in-one_desktop_pcRange<31.0.21024.8001
OR
hphp_z1_g8_tower_desktop_pcRange<31.0.21024.8001
OR
hphp_23.8_inch_all-in-one_desktop_pcRange<31.0.21024.8001
OR
hphp_z1_entry_tower_g5_workstationRange<23.10.18.05
OR
hphp_z1_entry_tower_g6_workstationRange<23.10.18.05
OR
hphp_z2_mini_g4_workstationRange<23.10.18.05
OR
hphp_z2_mini_g4_workstationRange<23.10.18.05
OR
hphp_z2_mini_g5_workstationRange<23.10.18.05
OR
hphp_z2_mini_g4_workstationRange<23.10.18.05
OR
hphp_z2_small_form_factor_g4_workstationRange<23.10.18.05
OR
hphp_z2_small_form_factor_g5_workstationRange<23.10.18.05
OR
hphp_z2_small_form_factor_g8_workstationRange<23.10.18.05
OR
hphp_z2_small_form_factor_g4_workstationRange<23.10.18.05
OR
hphp_z2_tower_g4_workstationRange<23.10.18.05
OR
hphp_z2_tower_g5_workstationRange<23.10.18.05
OR
hphp_z2_tower_g8_workstationRange<23.10.18.05
OR
hphp_z2_tower_g4_workstationRange<23.10.18.05
OR
hphp_z240_small_form_factor_workstationRange<23.10.18.05
OR
hphp_z240_tower_workstationRange<23.10.18.05
OR
hphp_z4_g4_workstation_\(core-x\)Range<23.10.18.05
OR
hphp_z4_g4_workstation_\(xeon_w\)Range<23.10.18.05
OR
hphp_z4_g5_workstationRange<23.10.18.05
OR
hphp_z440_workstationRange<23.10.18.05
OR
hphp_z6_g4_workstationRange<23.10.18.05
OR
hphp_z6_g5_workstationRange<23.10.18.05
OR
hphp_z640_workstationRange<23.10.18.05
OR
hphp_z8_g4_workstationRange<23.10.18.05
OR
hphp_z8_g5_fury_workstationRange<23.10.18.05
OR
hphp_z8_g5_workstationRange<23.10.18.05
OR
hphp_z840_workstationRange<23.10.18.05
OR
hphp_zcentral_4r_workstationRange<23.10.18.05
OR
hpradia_clientRange<31.0.21018.9001
OR
hpradia_clientRange<31.0.21018.9001
OR
hpradia_clientRange<31.0.21018.9001
OR
hphp_elite_dragonflyRange<31.0.21018.9001

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.3 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

17.1%