Lucene search

K
nvd[email protected]NVD:CVE-2021-26360
HistoryNov 09, 2022 - 9:15 p.m.

CVE-2021-26360

2022-11-0921:15:11
web.nvd.nist.gov
2
attacker
soc registers
security configuration
arbitrary code execution
amd secure processor
local access
unauthorized modifications

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.

Affected configurations

Nvd
Node
amdradeon_pro_w6300mMatch-
OR
amdradeon_pro_w6400Match-
OR
amdradeon_pro_w6500mMatch-
OR
amdradeon_pro_w6600Match-
OR
amdradeon_pro_w6600mMatch-
OR
amdradeon_pro_w6600xMatch-
OR
amdradeon_pro_w6800Match-
OR
amdradeon_pro_w6800xMatch-
OR
amdradeon_pro_w6800x_duoMatch-
OR
amdradeon_pro_w6900xMatch-
OR
amdradeon_rx_6300mMatch-
OR
amdradeon_rx_6400Match-
OR
amdradeon_rx_6500_xtMatch-
OR
amdradeon_rx_6500mMatch-
OR
amdradeon_rx_6600Match-
OR
amdradeon_rx_6600_xtMatch-
OR
amdradeon_rx_6600mMatch-
OR
amdradeon_rx_6600sMatch-
OR
amdradeon_rx_6650_xtMatch-
OR
amdradeon_rx_6650mMatch-
OR
amdradeon_rx_6650m_xtMatch-
OR
amdradeon_rx_6700Match-
OR
amdradeon_rx_6700_xtMatch-
OR
amdradeon_rx_6700mMatch-
OR
amdradeon_rx_6700sMatch-
OR
amdradeon_rx_6750_xtMatch-
OR
amdradeon_rx_6800Match-
OR
amdradeon_rx_6800_xtMatch-
OR
amdradeon_rx_6800mMatch-
OR
amdradeon_rx_6800sMatch-
OR
amdradeon_rx_6850m_xtMatch-
OR
amdradeon_rx_6900_xtMatch-
OR
amdradeon_rx_6950_xtMatch-
AND
amdenterprise_driverRange<22.10.20
OR
amdradeon_pro_softwareRange<22.q2enterprise
OR
amdradeon_softwareRange<22.5.2
VendorProductVersionCPE
amdradeon_pro_w6300m-cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*
amdradeon_pro_w6400-cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
amdradeon_pro_w6500m-cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*
amdradeon_pro_w6600-cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
amdradeon_pro_w6600m-cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*
amdradeon_pro_w6600x-cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*
amdradeon_pro_w6800-cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
amdradeon_pro_w6800x-cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*
amdradeon_pro_w6800x_duo-cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*
amdradeon_pro_w6900x-cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 361

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for NVD:CVE-2021-26360