CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.
[
{
"vendor": "AMD",
"product": "AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics",
"versions": [
{
"status": "affected",
"version": "various",
"versionType": "PI"
}
],
"defaultStatus": "affected"
},
{
"vendor": "AMD",
"product": "AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics",
"versions": [
{
"status": "unaffected",
"version": "PicassoPI-FP5 1.0.0.F"
}
],
"defaultStatus": "affected"
},
{
"vendor": "AMD",
"product": "AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics",
"versions": [
{
"status": "unaffected",
"version": "PollockPI-FT5 1.0.0.5"
}
],
"defaultStatus": "affected"
},
{
"vendor": "AMD",
"product": "AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics",
"versions": [
{
"status": "unaffected",
"version": "PicassoPI-FP5 1.0.0.E"
}
],
"defaultStatus": "affected"
},
{
"vendor": "AMD",
"product": "AMD RyzenTM Embedded R1000",
"versions": [
{
"status": "unaffected",
"version": "EmbeddedPI-FP5 1.2.0.A"
}
],
"defaultStatus": "affected"
},
{
"vendor": "AMD",
"product": "AMD RyzenTM Embedded R2000",
"versions": [
{
"status": "unaffected",
"version": "EmbeddedR2KPI-FP5 1.0.0.2"
}
],
"defaultStatus": "affected"
},
{
"vendor": "AMD",
"product": "AMD RyzenTM Embedded V1000",
"versions": [
{
"status": "unaffected",
"version": "EmbeddedPI-FP5 1.2.0.A"
}
],
"defaultStatus": "affected"
}
]
[
{
"cpes": [
"cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*"
],
"vendor": "amd",
"product": "athlon_3000g",
"versions": [
{
"status": "affected",
"version": "various"
},
{
"status": "unaffected",
"version": "1.0.0.F"
},
{
"status": "unaffected",
"version": "1.0.0.5"
},
{
"status": "unaffected",
"version": "1.0.0.E"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:a:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*"
],
"vendor": "amd",
"product": "ryzen_embedded_r1000",
"versions": [
{
"status": "unaffected",
"version": "1.2.0.A"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:a:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*"
],
"vendor": "amd",
"product": "ryzen_embedded_r2000",
"versions": [
{
"status": "unaffected",
"version": "1.0.0.2"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:a:amd:ryzen_embedded_v1000:*:*:*:*:*:*:*:*"
],
"vendor": "amd",
"product": "ryzen_embedded_v1000",
"versions": [
{
"status": "unaffected",
"version": "1.2.0.A"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
SSVC
Exploitation
none
Automatable
no
Technical Impact
total