Lucene search

K
nvd[email protected]NVD:CVE-2023-20560
HistoryAug 15, 2023 - 10:15 p.m.

CVE-2023-20560

2023-08-1522:15:09
CWE-20
web.nvd.nist.gov
amd ryzen master
input output control
validation
privileged attacker
null value
windows crash
denial of service
cve-2023-20560

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

5.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Insufficient validation of the IOCTL (Input Output Control) input buffer in AMD Ryzen™ Master may allow a privileged attacker to provide a null value potentially resulting in a Windows crash leading to denial of service.

Affected configurations

NVD
Node
amdryzen_masterRange<2.11.2.2659
OR
amdryzen_master_monitoring_sdkRange<august_2023
AND
microsoftwindows_10Match-
OR
microsoftwindows_11Match-

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

5.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for NVD:CVE-2023-20560