Lucene search

K
nvd[email protected]NVD:CVE-2021-26382
HistoryJul 14, 2022 - 8:15 p.m.

CVE-2021-26382

2022-07-1420:15:08
web.nvd.nist.gov

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

12.8%

An attacker with root account privileges can load any legitimately signed firmware image into the Audio Co-Processor (ACP,) irrespective of the respective signing key being declared as usable for authenticating an ACP firmware image, potentially resulting in a denial of service.

Affected configurations

NVD
Node
amdryzen_7_5700gMatch-
AND
amdryzen_7_5700g_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_7_5700geMatch-
AND
amdryzen_7_5700ge_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_5_5600gMatch-
AND
amdryzen_5_5600g_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_5_5600geMatch-
AND
amdryzen_5_5600ge_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_3_5300gMatch-
AND
amdryzen_3_5300g_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_3_5300geMatch-
AND
amdryzen_3_5300ge_firmwareRange<comboam4_v2_pi_1.2.0.6c
Node
amdryzen_9_5980hx_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5980hxMatch-
Node
amdryzen_9_5980hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5980hsMatch-
Node
amdryzen_7_5825u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5825uMatch-
Node
amdryzen_9_5900hx_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5900hxMatch-
Node
amdryzen_9_5900hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_9_5900hsMatch-
Node
amdryzen_7_5825c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5825cMatch-
Node
amdryzen_7_5800h_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5800hMatch-
Node
amdryzen_5_5625u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5625uMatch-
Node
amdryzen_7_5800hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5800hsMatch-
Node
amdryzen_5_5625c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5625cMatch-
Node
amdryzen_5_5600h_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5600hMatch-
Node
amdryzen_5_5600hs_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5600hsMatch-
Node
amdryzen_7_5800u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_7_5800uMatch-
Node
amdryzen_5_5600u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5600uMatch-
Node
amdryzen_5_5560u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_5_5560uMatch-
Node
amdryzen_3_5425u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5425uMatch-
Node
amdryzen_3_5425c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5425cMatch-
Node
amdryzen_3_5400u_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5400uMatch-
Node
amdryzen_3_5125c_firmwareRange<cezannepi-fp6_1.0.0.9
AND
amdryzen_3_5125cMatch-
Node
amdryzen_3_3200u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_3_3200uMatch-
Node
amdryzen_3_3250u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_3_3250uMatch-
Node
amdryzen_3_3300u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_3_3300uMatch-
Node
amdryzen_5_3500u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_5_3500uMatch-
Node
amdryzen_5_3550h_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_5_3550hMatch-
Node
amdryzen_5_3580u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_5_3580uMatch-
Node
amdryzen_7_3700u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_7_3700uMatch-
Node
amdryzen_7_pro_3700u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_7_pro_3700uMatch-
Node
amdryzen_7_3750h_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_7_3750hMatch-
Node
amdryzen_7_3780u_firmwareRange<renoirpi-fp6_1.0.0.7
AND
amdryzen_7_3780uMatch-

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

12.8%

Related for NVD:CVE-2021-26382