cve-2021-26367
Vulnerability from cvelistv5
Published
2024-08-13 16:50
Modified
2024-12-04 16:25
Severity ?
EPSS score ?
Summary
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2021-26367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T18:04:31.680686Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:25:09.987Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4v2 PI 1.2.0.5" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4PI 1.0.0.9" }, { "status": "unaffected", "version": "ComboAM4v2 PI 1.2.0.8" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4v2 PI 1.2.0.5" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PicassoPI-FP5 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PollockPI-FT5 1.0.0.4" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "PicassoPI-FP5 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RenoirPI-FP6 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Radeon\u2122 RX 6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: Adrenalin Edition 23.12.1 (23.30.13.01)" } ] }, { "defaultStatus": "affected", "product": "AMD Radeon\u2122 PRO W6000 Series Graphics Cards", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "AMD Software: PRO Edition 23.Q4 (23.30.13.03)" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP5 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedR2KPI-FP5 1.0.0.2" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP5 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V2000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP6 1.0.0.6" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability." } ], "value": "A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:50:05.825Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html" }, { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26367", "datePublished": "2024-08-13T16:50:05.825Z", "dateReserved": "2021-01-29T21:24:26.151Z", "dateUpdated": "2024-12-04T16:25:09.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-26367\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2024-08-13T17:15:17.360\",\"lastModified\":\"2024-12-12T20:41:56.120\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.\"},{\"lang\":\"es\",\"value\":\"Un atacante malicioso en x86 puede configurar mal las regiones de memoria confiable (TMR), lo que puede permitirle establecer un rango de direcciones arbitrario para la TMR, lo que podr\u00eda provocar una p\u00e9rdida de integridad y disponibilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@amd.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":6.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*\",\"versionEndExcluding\":\"23.12.1\",\"matchCriteriaId\":\"F71B3286-B679-4DC0-BDD1-784AC5577094\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C66880A-FB33-477D-93FD-C280A4547D66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD3F898-5AB1-4E60-A086-ADCF33820154\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863770A0-3A7F-43E3-98E5-77E42827FA6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1F7CD2-7D13-48A9-A7CC-3547A1D241DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4FED1D5-F31A-44C9-9101-D70486CC6FC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB12B48-ABF8-4FFB-BD4E-6413C34D477B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2D1C027-56B1-4EA7-842B-09B300B17808\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C24DE61-4036-42BF-A08F-67C234706703\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D9040F-1D1D-49E5-A60E-4393F5D76B60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A76A792F-7026-4F29-9A00-3A2EAB2DE5FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33DAF63F-C468-438C-97C3-B6CE8BD12858\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82D4745-ACAB-4FC2-A63D-3B0FEA208BED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD80D674-1DD4-44E0-8C38-8341A7F392B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10DD7029-9299-4901-A3D1-84D6102471B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F73C59A-CDE2-4203-921F-1831D4ACFD2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C980129B-D717-47F7-A6C1-5EB64FB1BF9A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76C585C-FCC8-456D-A63C-7A769AF5EB07\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0C52E8-26B1-4F77-B9D3-D08BFF72DAFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49540C5D-CEC7-4BCB-882B-73843CAFD55A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9466279D-0582-464E-AFCC-20872CC99B56\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12EF0B24-689D-4BE8-98D5-D88A84D5E473\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58299A7-7CA4-4EF8-81DC-9A41AA84FB2A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB218988-1483-4D96-9075-F79EDBC79974\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14D5A16-F7BE-427A-98AB-2E120DB756DC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E128B2-A9B7-4A1C-9ACF-7EB323B72B6F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC4A007-BEFD-4BF0-A176-7ECD6150041C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B658454-C160-4EBA-9F7A-E2B9FDEA8A1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*\",\"versionEndIncluding\":\"23.q4\",\"matchCriteriaId\":\"4397FD7C-3357-4F01-98F4-131000D23AA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85E68F7E-0A57-498A-9DB9-3D36045D671E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB91262-2EF4-4F0D-8B61-0012BD25E7A8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3083C065-5A2C-4B2D-9C1F-5793BA3C0A52\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7557738A-5D93-4117-8FF2-9A27CD0E6BC5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"cezannepi-fp6_1.0.0.6\",\"matchCriteriaId\":\"B1EFDD49-95E7-4E92-A476-9F7E9D2B222A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9921AE2D-F497-47C8-B463-947E230CF4F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3350u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"799912F4-2A5D-41F6-B645-5972B966617B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2452A625-5B59-49DF-A3C3-872642181E9D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3450u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"1D7DEDAC-51F3-4B72-8958-72CFDB8572A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3450u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533144EB-802F-496D-8C09-15AEA537F89B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"E25EF8F6-B5F3-478C-9AB5-60B29497D2F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3500c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"0AFE4E98-FAB0-4FDA-98E3-8A375C1C7D4F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B16B55B-11B3-43DB-860A-62CD3020B536\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"15FE9FAE-DEC6-42FA-8622-3D5B0C845928\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C6F103-30CC-4738-B489-B12790836B1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"3770F180-FB7C-410F-B49D-D30AA05326BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2EC993-8A65-416B-939F-1C707D596AF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"6CC0AC2E-CA16-46E5-A703-8DCD3EF82425\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"EF809F01-E6B3-4975-AC8B-EE2FDD199B14\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C03B5C8-9337-422B-9474-08EBBD0E0A45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228E3FBD-F997-402D-AE96-B14D66390700\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"4F2AC7D6-47AB-4178-9585-34293B36F576\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2293F6A-ECB3-462B-9CB6-1DF0EF43A816\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E11A9D-03EC-4014-BB1C-5286C694581B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_pro_3145b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"C05D78A9-2CED-4BA1-8382-BC8D722E91D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_pro_3145b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E514E0C-397F-4DF3-AD79-D7C800BAA28A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"8233A5D0-7796-4164-99CF-BB23B74563DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE30066-A56C-4997-BED2-FEB4F61D9F09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"03194384-10A2-4B6D-BED1-C01908249969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF28BE-F049-4716-AADE-643FABB753A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_pro_3045b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"03BCFD6B-04D1-4A27-AB06-90F8BA894E2C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_pro_3045b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3726F1B-6B01-4DCD-ABCE-4BC6469D8DD8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"754DE9E2-F441-4D7F-BDAB-6ADED0F9D76A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"951CA892-BAE2-46A4-BC86-0A205A4FA218\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4pi_1.0.0.9\",\"matchCriteriaId\":\"A192415A-41F1-4DF9-A351-A6E879E45431\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0FB0AF-E942-4257-A9F2-8077A753A169\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4pi_1.0.0.9\",\"matchCriteriaId\":\"76F10B69-9959-4977-893B-076BFBAC1BA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE68ECE-5298-4BC1-AC24-5CF613389CDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4pi_1.0.0.9\",\"matchCriteriaId\":\"7217BA72-D101-49C1-86B7-A63BFA01A056\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09DC414-96EE-478E-847C-7ACB5915659B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_pro_300ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4pi_1.0.0.9\",\"matchCriteriaId\":\"045D34B9-50A3-453D-A9E1-64180D1E1B5C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F521757-7ABC-4CEB-AD06-2FD738216E8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_4300ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"C52E5C9A-DC2E-428F-97CF-61C7340C0579\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"492017EE-C13F-4C40-887F-9C3C9F439898\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"62AB8A11-9C17-4528-A582-8340964C76A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1614C8C2-0DDF-464F-BAE5-812CED10CA17\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4700ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"5E240139-34E9-4D68-AEBB-6E641C75AB82\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D640C5C-C906-41A2-96BC-19299ADB9446\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_4300g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"1B184CA4-DA2E-4EF7-997C-BA563CB41A08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE6DAAF-7A5E-4D6C-862A-443647E66432\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_4600g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"40EDD65C-1101-4F0C-AD08-007A97D7184E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0005355A-DA7A-417D-8AF9-F6CC880040BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_4700g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"6DCE8037-1ED8-468A-9FBF-B79809A8089A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B44C21E-681A-4869-8D9D-D3898D9CBB3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5300ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"B2201670-E611-4C1E-BD06-E2B4262C3687\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E19774-C744-46AC-B8F8-2B3E2BB19050\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5300g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"7B0598FA-5EB7-41FF-AC46-BFBCE1EA1271\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34308FA-D6D1-4024-95F5-45C86EFBF00A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"1C51F223-5529-4D10-A7AF-44198DE58684\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F59A2AF2-5D13-480B-93CD-70AB6AEB60F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"35C8C0CE-AA13-434D-83BD-2DA454B1937C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5700ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"E5A8225E-A53A-4602-ACF6-F142D1CCF9FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"comboam4v2_pi_1.2.0.5\",\"matchCriteriaId\":\"BF3486C1-EAD5-4861-8463-506D59A5F7DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6746407-9EC7-49B2-93B4-926174F2A457\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.