Lucene search

K
redhatcveRedhat.comRH:CVE-2023-20560
HistoryAug 08, 2023 - 5:51 p.m.

CVE-2023-20560

2023-08-0817:51:04
redhat.com
access.redhat.com
4
amd
ryzen master
input output control
windows
denial of service
cve-2023-20560
mitigation
amd support
updates

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

9.0%

Insufficient validation of the IOCTL (Input Output Control) input buffer in AMD RyzenTM Master may allow a privileged attacker to provide a null value, potentially resulting in a Windows crash, leading to denial of service.

Mitigation

Please contact AMD support for updates.

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

9.0%

Related for RH:CVE-2023-20560