Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-26333

Summary
Assigner-AMD
Assigner Org ID-b58fc414-a1e4-4f92-9d70-1add41838648
Published At-21 Sep, 2021 | 10:49
Updated At-16 Sep, 2024 | 22:08
Rejected At-
Credits

AMD Chipset Driver Information Disclosure Vulnerability

An information disclosure vulnerability exists in AMD Platform Security Processor (PSP) chipset driver. The discretionary access control list (DACL) may allow low privileged users to open a handle and send requests to the driver resulting in a potential data leak from uninitialized physical pages.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:AMD
Assigner Org ID:b58fc414-a1e4-4f92-9d70-1add41838648
Published At:21 Sep, 2021 | 10:49
Updated At:16 Sep, 2024 | 22:08
Rejected At:
▼CVE Numbering Authority (CNA)
AMD Chipset Driver Information Disclosure Vulnerability

An information disclosure vulnerability exists in AMD Platform Security Processor (PSP) chipset driver. The discretionary access control list (DACL) may allow low privileged users to open a handle and send requests to the driver resulting in a potential data leak from uninitialized physical pages.

Affected Products
Vendor
Advanced Micro Devices, Inc.AMD
Product
PSP Driver
Versions
Affected
  • From PSP Driver before 5.17.0.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-200CWE-200 Information Exposure
Type: CWE
CWE ID: CWE-200
Description: CWE-200 Information Exposure
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://seclists.org/fulldisclosure/2021/Sep/24
mailing-list
x_refsource_FULLDISC
http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
x_refsource_MISC
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009
x_refsource_MISC
Hyperlink: http://seclists.org/fulldisclosure/2021/Sep/24
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
Resource:
x_refsource_MISC
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://seclists.org/fulldisclosure/2021/Sep/24
mailing-list
x_refsource_FULLDISC
x_transferred
http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
x_refsource_MISC
x_transferred
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009
x_refsource_MISC
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2021/Sep/24
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@amd.com
Published At:21 Sep, 2021 | 11:15
Updated At:26 Apr, 2022 | 15:33

An information disclosure vulnerability exists in AMD Platform Security Processor (PSP) chipset driver. The discretionary access control list (DACL) may allow low privileged users to open a handle and send requests to the driver resulting in a potential data leak from uninitialized physical pages.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.04.9MEDIUM
AV:L/AC:L/Au:N/C:C/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 4.9
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N
CPE Matches

Advanced Micro Devices, Inc.
amd
>>chipset_driver>>Versions before 3.08.17.735(exclusive)
cpe:2.3:a:amd:chipset_driver:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>psp_driver>>Versions before 5.17.0.0(exclusive)
cpe:2.3:a:amd:psp_driver:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-909Primarynvd@nist.gov
CWE-200Secondarypsirt@amd.com
CWE ID: CWE-909
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-200
Type: Secondary
Source: psirt@amd.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.htmlpsirt@amd.com
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2021/Sep/24psirt@amd.com
Mailing List
Third Party Advisory
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009psirt@amd.com
Vendor Advisory
Hyperlink: http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
Source: psirt@amd.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2021/Sep/24
Source: psirt@amd.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009
Source: psirt@amd.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

367Records found

CVE-2020-12987
Matching Score-10
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-10
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.23%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 21:50
Updated-17 Sep, 2024 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwareradeon_pro_softwarewindows_10AMD Radeon Software
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-12966
Matching Score-10
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-10
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 22.47%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:29
Updated-17 Sep, 2024 | 01:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_embedded_7f72_firmwareepyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7371_firmwareepyc_embedded_7371_firmwareepyc_embedded_7501epyc_7261epyc_7451epyc_7282_firmwareepyc_embedded_7f32epyc_7f32epyc_embedded_3251_firmwareepyc_7551_firmwareepyc_7272_firmwareepyc_embedded_7282epyc_7713pepyc_embedded_7451epyc_7443epyc_7513epyc_embedded_3201_firmwareepyc_embedded_7502p_firmwareepyc_embedded_7542_firmwareepyc_7232p_firmwareepyc_7702epyc_embedded_7702pepyc_7453epyc_7513_firmwareepyc_embedded_7262epyc_7542epyc_embedded_740p_firmwareepyc_7281_firmwareepyc_7413_firmwareepyc_7h12_firmwareepyc_7002epyc_7643_firmwareepyc_7f52epyc_embedded_3151_firmwareepyc_75f3epyc_7001epyc_embedded_7642_firmwareepyc_7f32_firmwareepyc_7502epyc_75f3_firmwareepyc_7001_firmwareepyc_7662_firmwareepyc_7f72_firmwareepyc_7343_firmwareepyc_7281epyc_7551epyc_embedded_740pepyc_embedded_7662epyc_7551pepyc_7313pepyc_7002_firmwareepyc_embedded_3101epyc_embedded_7302epyc_embedded_7642epyc_7551p_firmwareepyc_embedded_7551_firmwareepyc_embedded_7f32_firmwareepyc_embedded_7h12epyc_7601_firmwareepyc_embedded_3451_firmwareepyc_7352epyc_embedded_7301epyc_embedded_7401_firmwareepyc_7713_firmwareepyc_7401epyc_7742epyc_embedded_7252_firmwareepyc_7272epyc_7713epyc_7003_firmwareepyc_7443p_firmwareepyc_embedded_7742_firmwareepyc_7003epyc_embedded_3351_firmwareepyc_embedded_7402_firmwareepyc_embedded_7402p_firmwareepyc_embedded_3451epyc_embedded_7261epyc_embedded_7352_firmwareepyc_7261_firmwareepyc_embedded_7301_firmwareepyc_embedded_7232p_firmwareepyc_embedded_3201epyc_embedded_7532epyc_embedded_7302pepyc_embedded_7h12_firmwareepyc_7742_firmwareepyc_embedded_7261_firmwareepyc_7501epyc_7501_firmwareepyc_embedded_7452epyc_embedded_7272epyc_embedded_7552epyc_7301_firmwareepyc_embedded_7502pepyc_embedded_7371epyc_embedded_7451_firmwareepyc_7443_firmwareepyc_7402pepyc_7343epyc_embedded_7742epyc_7252_firmwareepyc_7543_firmwareepyc_embedded_7501_firmwareepyc_embedded_755pepyc_7542_firmwareepyc_7763_firmwareepyc_embedded_7302p_firmwareepyc_embedded_7502_firmwareepyc_embedded_7232pepyc_embedded_735pepyc_embedded_7351_firmwareepyc_7313p_firmwareepyc_7252epyc_7502pepyc_embedded_7252epyc_7302p_firmwareepyc_7351p_firmwareepyc_embedded_7f52_firmwareepyc_embedded_3251epyc_embedded_755p_firmwareepyc_embedded_3101_firmwareepyc_7642_firmwareepyc_embedded_7532_firmwareepyc_7452epyc_7h12epyc_embedded_7601_firmwareepyc_7543p_firmwareepyc_embedded_7402epyc_7401pepyc_embedded_7f72epyc_7302epyc_7601epyc_embedded_3255_firmwareepyc_embedded_7601epyc_7232pepyc_embedded_7302_firmwareepyc_embedded_7401epyc_7663epyc_7552_firmwareepyc_embedded_3351epyc_embedded_7702_firmwareepyc_72f3_firmwareepyc_7371epyc_embedded_7251_firmwareepyc_7f72epyc_7662epyc_7642epyc_7451_firmwareepyc_7532_firmwareepyc_embedded_7281_firmwareepyc_embedded_7542epyc_7502p_firmwareepyc_embedded_7662_firmwareepyc_7413epyc_7301epyc_7401p_firmwareepyc_embedded_7551epyc_7313epyc_7351pepyc_embedded_7282_firmwareepyc_7663_firmwareepyc_embedded_7702p_firmwareepyc_7351_firmwareepyc_7251epyc_7552epyc_7302pepyc_7702p_firmwareepyc_embedded_7552_firmwareepyc_74f3_firmwareepyc_7763epyc_7302_firmwareepyc_embedded_3151epyc_embedded_3255epyc_7402_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7702pepyc_embedded_7402pepyc_embedded_7281epyc_7f52_firmwareepyc_7262epyc_embedded_7262_firmwareepyc_embedded_7352epyc_embedded_7702epyc_embedded_7452_firmwareepyc_7251_firmwareepyc_7401_firmwareepyc_72f3epyc_7643epyc_embedded_7251epyc_embedded_735p_firmwareepyc_7402p_firmwareepyc_7452_firmwareepyc_7351epyc_7543pepyc_7313_firmwareepyc_embedded_7272_firmwareepyc_7443pepyc_7453_firmwareepyc_7282epyc_embedded_7f52epyc_embedded_7502epyc_7702_firmwareepyc_74f3epyc_7352_firmwareepyc_7532epyc_embedded_7351epyc_73f31st/2nd/3rd Gen AMD EPYC™ Processors
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-23824
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.74%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 20:48
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.

Action-Not Available
Vendor-Xen ProjectFedora ProjectAdvanced Micro Devices, Inc.
Product-epyc_7543ryzen_5_3580uepyc_7402athlon_silver_3050u_firmwareepyc_7f32epyc_7713pepyc_7443epyc_7513athlon_x4_880k_firmwareryzen_7_4700geryzen_5_2500uathlon_x4_940_firmwareryzen_9_5980hxryzen_5_5600hsathlon_x4_830_firmwareryzen_3_2300uryzen_7_5825uryzen_7_5825u_firmwareepyc_7542ryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7413_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_2950xryzen_5_2700_firmwareryzen_5_4500u_firmwareathlon_x4_760kepyc_7002epyc_7643_firmwareepyc_7f52ryzen_threadripper_pro_5945wxryzen_7_pro_3700u_firmwareepyc_7373x_firmwareryzen_5_2500u_firmwareryzen_3_4300g_firmwareepyc_7f32_firmwareryzen_7_3750hepyc_7001_firmwareepyc_75f3_firmwareepyc_7473x_firmwareryzen_3_2200u_firmwarea12-9730pepyc_7281ryzen_3_2200uepyc_7551p_firmwareryzen_threadripper_2920xepyc_7601_firmwareryzen_7_5825c_firmwareepyc_7573x_firmwareryzen_5_2600ryzen_7_2700x_firmwareryzen_5_2600hathlon_x4_750ryzen_5_3500uepyc_7401ryzen_3_5400uepyc_7713ryzen_5_3550hryzen_5_4500uryzen_threadripper_3990x_firmwareryzen_7_3780u_firmwareryzen_3_4300uepyc_7003ryzen_7_4800h_firmwareryzen_3_4300u_firmwareryzen_9_5980hs_firmwareryzen_7_3700x_firmwareryzen_threadripper_3990xryzen_5_3400g_firmwareathlon_x4_835_firmwareryzen_7_2700_firmwareryzen_5_5600h_firmwareryzen_5_2700xryzen_3_4300geryzen_5_2600_firmwareryzen_7_4700uepyc_7501a6-9220c_firmwareathlon_x4_970_firmwareathlon_x4_870kryzen_5_3600_firmwareryzen_5_3580u_firmwareryzen_5_4600hryzen_3_3200u_firmwareepyc_7443_firmwareathlon_x4_940athlon_x4_750_firmwareryzen_3_3300x_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7543_firmwarea4-9120_firmwareepyc_7542_firmwareryzen_3_3300ua6-9210ryzen_threadripper_pro_5945wx_firmwareepyc_7313p_firmwareryzen_7_4800hepyc_7252ryzen_5_5600uryzen_5_3550h_firmwareryzen_5_3450gepyc_7502pepyc_7351p_firmwareryzen_9_4900hryzen_7_pro_3700ufedoraathlon_x4_840ryzen_7_3700u_firmwareathlon_x4_860k_firmwareryzen_7_2700u_firmwareryzen_5_2700epyc_7601ryzen_7_3800x_firmwarea6-9220ryzen_7_2800h_firmwarea10-9600p_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_9_5900hs_firmwareepyc_72f3_firmwareepyc_7662a10-9630p_firmwareepyc_7642ryzen_threadripper_pro_5975wx_firmwareepyc_7502p_firmwareryzen_5_4600h_firmwareepyc_7413ryzen_7_2700xepyc_7313ryzen_threadripper_pro_3955wxepyc_7663_firmwareryzen_3_3200uryzen_7_3700uepyc_7251epyc_7351_firmwareathlon_x4_830epyc_7302pathlon_silver_3050uepyc_74f3_firmwareryzen_3_5425uryzen_5_4600gepyc_7763ryzen_threadripper_pro_3955wx_firmwareathlon_x4_835athlon_x4_845_firmwareepyc_7402_firmwareryzen_9_5980hx_firmwareepyc_7713p_firmwareathlon_x4_760k_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareathlon_x4_845ryzen_7_5825cryzen_7_5800uepyc_7251_firmwareepyc_7401_firmwareathlon_x4_860ka4-9120epyc_7402p_firmwareryzen_threadripper_2990wxryzen_3_4300ge_firmwareryzen_threadripper_3970xryzen_3_5425c_firmwareepyc_7351ryzen_7_5800hepyc_7543pryzen_threadripper_3970x_firmwareryzen_7_4800uepyc_7502_firmwareryzen_5_2700x_firmwareepyc_7262_firmwareryzen_7_4800u_firmwareepyc_7371_firmwareathlon_x4_870k_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7551_firmwareepyc_7272_firmwareepyc_7573xryzen_3_3100_firmwareryzen_threadripper_2950x_firmwarea9-9410_firmwareepyc_7702ryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwarea9-9420_firmwareryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_3600xt_firmwareepyc_7373xepyc_7513_firmwareryzen_5_3600x_firmwareryzen_7_3750h_firmwareepyc_7h12_firmwareryzen_threadripper_3960xryzen_5_5560uepyc_75f3epyc_7001ryzen_3_3100epyc_7502epyc_7f72_firmwareepyc_7662_firmwareepyc_7343_firmwareryzen_7_3780uepyc_7551athlon_x4_840_firmwareryzen_9_5900hsepyc_7551pepyc_7313pepyc_7002_firmwareryzen_9_5980hsathlon_x4_970a10-9630pathlon_x4_950_firmwareryzen_3_5125c_firmwareryzen_7_3800xt_firmwareryzen_7_2700ryzen_7_5800h_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xryzen_5_5625c_firmwareepyc_7352ryzen_5_5625cepyc_7713_firmwareepyc_7742epyc_7272ryzen_7_2700uryzen_5_3450g_firmwarea10-9600pryzen_9_4900h_firmwareryzen_5_4600geepyc_7003_firmwareepyc_7443p_firmwareryzen_7_2800hepyc_7773xryzen_5_2600x_firmwareryzen_5_5600hs_firmwareepyc_7261_firmwareathlon_gold_3150uryzen_threadripper_pro_5955wxryzen_3_5400u_firmwareepyc_7742_firmwareryzen_threadripper_pro_3795wxryzen_3_3300u_firmwareryzen_7_3800xepyc_7501_firmwarea12-9730p_firmwareryzen_5_4600uepyc_7301_firmwareryzen_threadripper_2990wx_firmwareryzen_5_4600u_firmwareryzen_5_5600hepyc_7763_firmwareryzen_3_5425cryzen_3_3300g_firmwareryzen_5_3600xtryzen_3_5425u_firmwareryzen_threadripper_pro_5975wxryzen_3_2300u_firmwarea12-9700pepyc_7302p_firmwarea12-9700p_firmwareryzen_9_5900hx_firmwarea9-9420epyc_7642_firmwareryzen_threadripper_2970wxepyc_7452epyc_7h12a6-9220_firmwareepyc_7543p_firmwareryzen_5_2600xryzen_5_5625uryzen_threadripper_2920x_firmwareepyc_7401pryzen_3_4300gepyc_7302ryzen_3_5125cryzen_7_4700g_firmwareepyc_7663ryzen_5_5600u_firmwareepyc_7552_firmwareepyc_7773x_firmwareryzen_5_3600xepyc_7371epyc_7f72ryzen_7_3800xtryzen_threadripper_2970wx_firmwareepyc_7473xepyc_7451_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7301epyc_7401p_firmwareepyc_7351pryzen_7_4700ge_firmwareryzen_7_5800u_firmwareryzen_7_4700u_firmwareepyc_7532a6-9220cepyc_7552athlon_x4_950epyc_7302_firmwarea6-9210_firmwarea9-9410ryzen_5_5560u_firmwareepyc_7262ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxxenryzen_9_5900hxryzen_3_3250uepyc_72f3epyc_7643athlon_gold_3150u_firmwareepyc_7452_firmwareryzen_3_3300gepyc_7313_firmwareepyc_7443pryzen_3_3250u_firmwareathlon_x4_880kryzen_5_3600ryzen_threadripper_pro_3945wxryzen_5_3500u_firmwareryzen_7_5800hs_firmwareryzen_5_4600ge_firmwareepyc_7282ryzen_threadripper_pro_5995wx_firmwareryzen_5_5625u_firmwareepyc_7352_firmwareepyc_74f3epyc_7702_firmwareAMD Processors
CVE-2021-46766
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-2.5||LOW
EPSS-0.02% / 3.92%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:51
Updated-04 Aug, 2024 | 05:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_9124_firmwareepyc_9684xepyc_9254_firmwareryzen_threadripper_pro_3955wxepyc_9354pepyc_9474fepyc_9754sepyc_9274fepyc_9734epyc_9454pepyc_9654pepyc_9684x_firmwareepyc_9734_firmwareepyc_9454_firmwareepyc_9384xryzen_threadripper_pro_3955wx_firmwareepyc_9534epyc_9374fepyc_9124epyc_9354epyc_9254epyc_9654p_firmwareryzen_threadripper_pro_3995wx_firmwareepyc_9334epyc_9474f_firmwareepyc_9374f_firmwareepyc_9334_firmwareepyc_9454p_firmwareepyc_9454epyc_9554_firmwareepyc_9534_firmwareepyc_9754_firmwareepyc_9384x_firmwareryzen_threadripper_pro_3975wxryzen_threadripper_pro_3945wx_firmwareepyc_9354_firmwareepyc_9274f_firmwareepyc_9634epyc_9554p_firmwareepyc_9354p_firmwareepyc_9224_firmwareepyc_9174fryzen_threadripper_pro_3945wxepyc_9184xepyc_9184x_firmwareepyc_9754ryzen_threadripper_pro_3975wx_firmwareepyc_9224epyc_9754s_firmwareryzen_threadripper_pro_3995wxepyc_9634_firmwareepyc_9554epyc_9174f_firmwareepyc_9654_firmwareepyc_9554pepyc_9654AMD EPYC™ Embedded 90034th Gen AMD EPYC™ ProcessorsRyzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS
CWE ID-CWE-459
Incomplete Cleanup
CVE-2020-12904
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.67%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:12
Updated-16 Sep, 2024 | 16:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12912
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.95% / 75.44%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 19:08
Updated-04 Aug, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.

Action-Not Available
Vendor-n/aAdvanced Micro Devices, Inc.
Product-energy_driver_for_linuxAMD extension to Linux "hwmon" for Zen1 platforms
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-12901
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.88%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 19:20
Updated-17 Sep, 2024 | 03:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-416
Use After Free
CVE-2020-12905
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.88%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 19:40
Updated-17 Sep, 2024 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12897
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.88%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:44
Updated-16 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CVE-2023-20588
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-4.00% / 87.97%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:06
Updated-17 Oct, 2024 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Speculative Leaks

A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 

Action-Not Available
Vendor-Debian GNU/LinuxMicrosoft CorporationXen ProjectFedora ProjectAdvanced Micro Devices, Inc.
Product-windows_server_2022_23h2athlon_gold_pro_3150ge_firmwareryzen_3_pro_3200ge_firmwareepyc_7371_firmwareepyc_7261epyc_7451ryzen_5_pro_3400g_firmwareryzen_3_3200gewindows_11_21h2epyc_7551_firmwareryzen_5_pro_3350ge_firmwareathlon_silver_pro_3125ge_firmwarewindows_10_21h2epyc_7351p_firmwareathlon_pro_300gefedoraathlon_gold_pro_3150gwindows_10_22h2epyc_7571_firmwareryzen_5_pro_3400gepyc_7401pryzen_5_3400gepyc_7281_firmwareathlon_silver_pro_3125geepyc_7601ryzen_5_pro_3350geryzen_3_pro_3200geryzen_3_pro_3200g_firmwareepyc_7371athlon_pro_300ge_firmwareryzen_3_3200g_firmwareryzen_3_pro_3200gathlon_silver_3050gedebian_linuxepyc_7451_firmwareryzen_3_3200gepyc_7281epyc_7551windows_11_22h2epyc_7301epyc_7551pwindows_server_2008epyc_7401p_firmwareathlon_gold_3150gwindows_server_2016athlon_silver_3050ge_firmwarewindows_server_2012epyc_7351pepyc_7551p_firmwarewindows_10_1507ryzen_5_pro_3350g_firmwareepyc_7601_firmwareepyc_7351_firmwareepyc_7251epyc_7401epyc_7571athlon_gold_pro_3150gexenwindows_10_1607athlon_gold_pro_3150g_firmwareathlon_gold_3150geepyc_7251_firmwareepyc_7401_firmwareryzen_5_pro_3400geryzen_5_pro_3350gryzen_3_3200ge_firmwareryzen_5_3400g_firmwareepyc_7351epyc_7261_firmwarewindows_11_23h2windows_10_1809ryzen_5_pro_3400ge_firmwareathlon_gold_3150ge_firmwareepyc_7501epyc_7501_firmwareathlon_gold_3150g_firmwareepyc_7301_firmwarewindows_server_2019Athlon™ PRO 3000 Series Processors with Radeon™ Vega Graphics EPYC™ 7001 ProcessorsRyzen™ PRO 3000 Series Processors with Radeon™ Vega GraphicsAthlon™ 3000 Series Processors with Radeon™ Graphics Ryzen™ 3000 Series Processors with Radeon™ Graphics
CWE ID-CWE-369
Divide By Zero
CVE-2023-20597
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 24.78%
||
7 Day CHG+0.03%
Published-20 Sep, 2023 | 17:32
Updated-27 Jun, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_6600hryzen_3_3500uryzen_threadripper_3970xryzen_3800x_firmwareryzen_3_3250c_firmwareryzen_5_5600ge_firmwareryzen_3600xryzen_4300geryzen_3900xt_firmwareryzen_3_3200gryzen_5_5700ge_firmwareryzen_3_3350uryzen_threadripper_pro_3945wxryzen_4700g_firmwareryzen_5600gryzen_4300ge_firmwareryzen_5_5560uryzen_3_3550h_firmwareryzen_5_5500u_firmwareryzen_3_3300ryzen_5995wxryzen_3_3100_firmwareryzen_3100ryzen_5_5600hs_firmwareryzen_3995wxryzen_3800xryzen_3_3580uryzen_5600ryzen_6800h_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_3100_firmwareryzen_5500_firmwareryzen_3800xtryzen_5700geryzen_3_3300g_firmwareryzen_3_3500u_firmwareryzen_3970x_firmwareryzen_4700gryzen_threadripper_3990xryzen_5_5700gryzen_4600gryzen_3_3350u_firmwareryzen_3955wxryzen_5_5700g_firmwareryzen_3975wx_firmwareryzen_3_3300_firmwareryzen_3500xryzen_3_3250uryzen_5800x3d_firmwareryzen_3900xtryzen_5700xryzen_5950x_firmwareryzen_3_3200g_firmwareryzen_3900ryzen_5_5625c_firmwareryzen_3_3300u_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_6800hsryzen_3_3750hryzen_5700x_firmwareryzen_5955wxryzen_3600_firmwareryzen_5995wx_firmwareryzen_5600ge_firmwareryzen_5900xryzen_4600geryzen_5_5600hryzen_3_3700cryzen_3_3700uryzen_3500ryzen_5500ryzen_5900x_firmwareryzen_6900hsryzen_3_3200ge_firmwareryzen_3990x_firmwareryzen_6600uryzen_6980hxryzen_4300gryzen_3300xryzen_5975wx_firmwareryzen_3995wx_firmwareryzen_3300x_firmwareryzen_5900ryzen_5_5600uryzen_3975wxryzen_5700g_firmwareryzen_5_5600_firmwareryzen_5800_firmwareryzen_3600ryzen_5_5600g_firmwareryzen_3945wx_firmwareryzen_5700gryzen_3_3550hryzen_5950xryzen_5965wxryzen_5_5600geryzen_3950x_firmwareryzen_5_5625uryzen_5300gryzen_threadripper_3970x_firmwareryzen_5300g_firmwareryzen_5_5600x_firmwareryzen_6600u_firmwareryzen_5600_firmwareryzen_6900hx_firmwareryzen_6800hryzen_6600hsryzen_5300geryzen_5_5600xryzen_3900xryzen_3_3300uryzen_3945wxryzen_3970xryzen_threadripper_pro_3975wx_firmwareryzen_3600xtryzen_5_5600h_firmwareryzen_3_3500cryzen_5800x3dryzen_3_3200geryzen_5800x_firmwareryzen_threadripper_pro_3795wxryzen_3_3200u_firmwareryzen_3_3250u_firmwareryzen_3_3500c_firmwareryzen_5_5560u_firmwareryzen_threadripper_pro_3795wx_firmwareryzen_3_3250cryzen_5600g_firmwareryzen_6600h_firmwareryzen_5_5600x3dryzen_3955wx_firmwareryzen_threadripper_3960x_firmwareryzen_6900hxryzen_4700ge_firmwareryzen_3_3780u_firmwareryzen_3_3700c_firmwareryzen_5600geryzen_4600ge_firmwareryzen_5600x_firmwareryzen_5900_firmwareryzen_5_5500_firmwareryzen_5_5600hsryzen_3960xryzen_4300g_firmwareryzen_3_3700u_firmwareryzen_3900x_firmwareryzen_3900_firmwareryzen_3_3200uryzen_6900hs_firmwareryzen_6980hx_firmwareryzen_6800u_firmwareryzen_6980hs_firmwareryzen_threadripper_pro_3975wxryzen_3_3780uryzen_3950xryzen_5_5600u_firmwareryzen_3_3300gryzen_4700geryzen_5955wx_firmwareryzen_5965wx_firmwareryzen_5800xryzen_5_5600gryzen_3600xt_firmwareryzen_3_3580u_firmwareryzen_5600xryzen_threadripper_pro_3995wxryzen_3_3300xryzen_3_3100ryzen_3500_firmwareryzen_3990xryzen_4700sryzen_6980hsryzen_5_5600ryzen_5945wxryzen_5700ge_firmwareryzen_4600g_firmwareryzen_5_5600x3d_firmwareryzen_5945wx_firmwareryzen_6600hs_firmwareryzen_3_3450u_firmwareryzen_threadripper_pro_3955wx_firmwareryzen_3600x_firmwareryzen_threadripper_3990x_firmwareryzen_6800hs_firmwareryzen_5300ge_firmwareryzen_3_3300x_firmwareryzen_3_3750h_firmwareryzen_6800uryzen_5_5500uryzen_3_3450uryzen_threadripper_pro_3955wxryzen_3800xt_firmwareryzen_4700s_firmwareryzen_5_5500ryzen_5_5625cryzen_3960x_firmwareryzen_3500x_firmwareryzen_threadripper_3960xryzen_5975wxryzen_5800ryzen_5_5625u_firmwareryzen_5_5700geRyzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS SP3AMD Ryzen™ Embedded V3000Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics "Rembrandt-R"Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDTRyzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”AMD Ryzen™ Embedded 5000AMD EPYC™ Embedded 7003AMD Ryzen™ Embedded V2000Ryzen™ 6000 Series Mobile Processors with Radeon™ Graphics "Rembrandt"Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics "Barcelo"Ryzen™ 3000 Series Desktop Processors “Matisse”Ryzen™ 5000 Series Desktop Processors “Vermeer”
CWE ID-CWE-665
Improper Initialization
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2023-20593
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-6.32% / 90.59%
||
7 Day CHG~0.00%
Published-24 Jul, 2023 | 19:38
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Debian GNU/Linux
Product-epyc_7302pryzen_9_3950xryzen_3_pro_4350g_firmwareryzen_3_5300uepyc_7742_firmwareepyc_7702pepyc_7552_firmwareepyc_7f32_firmwareepyc_7f52_firmwareepyc_7272_firmwareepyc_7302p_firmwareryzen_7_5700u_firmwareepyc_7232p_firmwareryzen_threadripper_3960xepyc_7402epyc_7662epyc_7662_firmwareryzen_5_5500uryzen_9_3900xepyc_7452ryzen_threadripper_3990x_firmwareepyc_7542epyc_7f72ryzen_3_4300g_firmwareryzen_7_pro_4750geryzen_threadripper_pro_3975wx_firmwareathlon_gold_7220uryzen_3_pro_4350ge_firmwareepyc_7262_firmwareepyc_7f72_firmwareepyc_7f52ryzen_9_3900_firmwareryzen_3_pro_4200g_firmwareryzen_7_3800xryzen_7_4700gryzen_3_4300gepyc_7402p_firmwareryzen_7_4700g_firmwareepyc_7282_firmwareepyc_7282ryzen_7_3800x_firmwareryzen_9_3950x_firmwareryzen_3_3300x_firmwareryzen_5_3500_firmwareepyc_7702ryzen_5_pro_4650gepyc_7272epyc_7532_firmwareryzen_7_3700x_firmwareepyc_7352_firmwareryzen_threadripper_3990xepyc_7302epyc_7352ryzen_7_4700geepyc_7232pathlon_gold_7220u_firmwareryzen_7_5700uryzen_threadripper_3970x_firmwareryzen_5_pro_4650g_firmwareepyc_7252ryzen_3_pro_4450u_firmwareepyc_7552ryzen_9_pro_3900_firmwareryzen_5_3600xt_firmwareryzen_3_3100_firmwareryzen_5_7520u_firmwareryzen_7_3800xtepyc_7542_firmwareryzen_3_4300ge_firmwareryzen_3_pro_4200gepyc_7h12epyc_7502ryzen_3_3300xepyc_7452_firmwareryzen_5_3600x_firmwareryzen_5_3500ryzen_threadripper_pro_3955wxryzen_threadripper_pro_3995wxxenryzen_7_pro_4750g_firmwareryzen_7_pro_4750ge_firmwareepyc_7642ryzen_3_7320uepyc_7702p_firmwareepyc_7502pryzen_5_pro_4400g_firmwareryzen_threadripper_pro_3945wx_firmwareepyc_7502p_firmwareryzen_9_pro_3900ryzen_7_3700xepyc_7252_firmwareryzen_5_pro_4650ge_firmwareryzen_threadripper_3960x_firmwareryzen_5_3600xtryzen_5_3600xryzen_3_7320u_firmwareryzen_3_4300geryzen_9_3900xt_firmwareryzen_5_7520uepyc_7302_firmwareepyc_7502_firmwareryzen_7_3800xt_firmwareryzen_5_3500xryzen_5_4600ge_firmwareryzen_7_pro_4750gepyc_7f32ryzen_5_pro_4650geepyc_7402pryzen_threadripper_pro_3945wxepyc_7642_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_3_pro_4350gryzen_threadripper_pro_3975wxryzen_3_pro_4450uryzen_9_3900x_firmwareepyc_7532ryzen_7_pro_4750u_firmwareryzen_threadripper_pro_3955wx_firmwareepyc_7742ryzen_5_3600_firmwareryzen_9_3900xtryzen_5_3500x_firmwareryzen_7_4700ge_firmwareryzen_5_4600geryzen_5_4600g_firmwareryzen_3_5300u_firmwareryzen_5_3600ryzen_threadripper_3970xryzen_3_3100ryzen_7_pro_4750uepyc_7702_firmwareryzen_5_4600gepyc_7402_firmwareryzen_9_3900ryzen_5_5500u_firmwaredebian_linuxryzen_5_pro_4400gepyc_7h12_firmwareryzen_3_pro_4350geepyc_72622nd Gen AMD EPYC™ ProcessorsRyzen™ 5000 Series Mobile processors with Radeon™ Graphics “Lucienne”Ryzen™ 3000 Series Desktop Processors “Matisse” AM4Ryzen™ 4000 Series Mobile processors with Radeon™ Graphics “Renoir”Ryzen™ 7020 Series processors “Mendocino” FT6Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP33rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDTAMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2021-26313
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.85%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 11:23
Updated-16 Sep, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AMD Speculative Code Store Bypass

Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Intel CorporationDebian GNU/LinuxBroadcom Inc.Arm Limited
Product-debian_linuxcore_i7-7700kryzen_5_5600xxeon_silver_4214core_i7-10700kryzen_threadripper_2990wxcortex-a72xenryzen_7_2700xcore_i9-9900kbcm2711All supported processors
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-26327
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.88%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 18:18
Updated-17 Sep, 2024 | 02:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7313epyc_7443_firmwareepyc_7343epyc_7663_firmwareepyc_7543_firmwareepyc_7763_firmwareepyc_7713pepyc_7443epyc_74f3_firmwareepyc_7513epyc_7313p_firmwareepyc_7763epyc_7713_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7453epyc_7713epyc_7003_firmwareepyc_7443p_firmwareepyc_7513_firmwareepyc_7543p_firmwareepyc_7003epyc_7413_firmwareepyc_72f3epyc_7643epyc_7643_firmwareepyc_7663epyc_75f3epyc_72f3_firmwareepyc_7313_firmwareepyc_7543pepyc_7443pepyc_75f3_firmwareepyc_7453_firmwareepyc_7343_firmwareepyc_74f3epyc_7413epyc_7313pepyc_73f33rd Gen AMD EPYC™
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-26404
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.58%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-08 Apr, 2025 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7313epyc_7443_firmwareepyc_7343epyc_7663_firmwareepyc_7543_firmwareepyc_7763_firmwareepyc_7573x_firmwareepyc_7573xepyc_7713pepyc_7443epyc_74f3_firmwareepyc_7513epyc_7313p_firmwareepyc_7763epyc_7713_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7453epyc_7373xepyc_7713epyc_7003_firmwareepyc_7443p_firmwareepyc_7513_firmwareepyc_7543p_firmwareepyc_7773xepyc_7003epyc_7413_firmwareepyc_7643epyc_7643_firmwareepyc_7663epyc_7773x_firmwareepyc_75f3epyc_7373x_firmwareepyc_7313_firmwareepyc_7543pepyc_7443pepyc_75f3_firmwareepyc_7473xepyc_7453_firmwareepyc_7343_firmwareepyc_7473x_firmwareepyc_74f3epyc_7413epyc_7313pepyc_73f33rd Gen EPYC
CWE ID-CWE-20
Improper Input Validation
CVE-2021-26407
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 22.70%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-08 Apr, 2025 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A randomly generated Initialization Vector (IV) may lead to a collision of IVs with the same key potentially resulting in information disclosure.

Action-Not Available
Vendor-AMDAdvanced Micro Devices, Inc.
Product-romepiromepi_firmware2nd Gen EPYC
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-26337
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 34.53%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 18:24
Updated-17 Sep, 2024 | 03:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareryzen_5800x_firmwareepyc_7282_firmwareepyc_7f32epyc_7272_firmwareepyc_7713pryzen_3_3100_firmwareepyc_7443epyc_7513ryzen_threadripper_2950x_firmwareryzen_5600gryzen_9_3900xryzen_pro_3200g_firmwareepyc_7232p_firmwareryzen_9_5980hxepyc_7702ryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwareryzen_5_5600xryzen_pro_3400g_firmwareryzen_pro_3700_firmwareryzen_threadripper_pro_5995wxepyc_7453ryzen_5_5600hsryzen_pro_5750geryzen_7_5825uepyc_7513_firmwareryzen_7_5825u_firmwareryzen_pro_5650geryzen_5_3600x_firmwareepyc_7542ryzen_5_3400gepyc_7413_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_3960xryzen_threadripper_2950xryzen_threadripper_pro_3975wxepyc_7002epyc_7643_firmwareryzen_5900xepyc_7f52ryzen_5300ge_firmwareepyc_75f3ryzen_threadripper_pro_5945wxryzen_pro_5650g_firmwareryzen_5700gepyc_7f32_firmwareryzen_3_3100epyc_7502epyc_75f3_firmwareepyc_7662_firmwareepyc_7f72_firmwareepyc_7343_firmwareryzen_9_5900hsryzen_5300g_firmwareryzen_pro_3200geepyc_7313pepyc_7002_firmwareryzen_threadripper_2920xryzen_9_5980hsryzen_7_5800h_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_pro_5750g_firmwareryzen_7_3700xryzen_3_3300xryzen_5950x_firmwareepyc_7352ryzen_pro_5350gepyc_7713_firmwareepyc_7742epyc_7272ryzen_5_3450g_firmwareryzen_3_5400uepyc_7713epyc_7003_firmwareepyc_7443p_firmwareryzen_pro_3900_firmwareryzen_threadripper_3990x_firmwareryzen_pro_3200gepyc_7003ryzen_pro_3700ryzen_5_5600x_firmwareryzen_5700g_firmwareryzen_9_5980hs_firmwareryzen_7_3700x_firmwareryzen_5900x_firmwareryzen_5300gryzen_5700geryzen_threadripper_3990xryzen_5_5600hs_firmwareryzen_5_3400g_firmwareryzen_5800x3d_firmwareryzen_5_5600h_firmwareryzen_threadripper_pro_5955wxryzen_3_5400u_firmwareepyc_7742_firmwareryzen_7_3800xryzen_pro_5350g_firmwareryzen_5_3600_firmwareryzen_pro_5650ge_firmwareryzen_threadripper_2990wx_firmwareepyc_7443_firmwareryzen_5_5600hepyc_7402pepyc_7343ryzen_5600x_firmwareepyc_7252_firmwareepyc_7543_firmwareryzen_3_3300x_firmwareepyc_7542_firmwareepyc_7763_firmwareryzen_threadripper_pro_5945wx_firmwareryzen_3_5425u_firmwareryzen_3_3300g_firmwareepyc_7313p_firmwareryzen_5_3450gepyc_7252epyc_7502pryzen_5600geryzen_5_5600uryzen_threadripper_pro_5975wxepyc_7302p_firmwareryzen_9_5900hx_firmwareryzen_pro_3900epyc_7642_firmwareryzen_threadripper_2970wxryzen_5600ge_firmwareepyc_7452epyc_7543p_firmwareryzen_5_5625uryzen_threadripper_2920x_firmwareryzen_5600g_firmwareryzen_pro_3600_firmwareepyc_7302ryzen_7_3800x_firmwareryzen_pro_5750ge_firmwareryzen_pro_3400ge_firmwareepyc_7232pryzen_threadripper_pro_3945wx_firmwareryzen_9_5900hs_firmwareepyc_7663ryzen_5_5600u_firmwareepyc_7552_firmwareryzen_5_3600xepyc_72f3_firmwareryzen_pro_3350gepyc_7f72epyc_7662epyc_7642ryzen_threadripper_2970wx_firmwareryzen_threadripper_pro_5975wx_firmwareryzen_5800xryzen_9_3950x_firmwareryzen_5700ge_firmwareepyc_7532_firmwareryzen_pro_5350ge_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareepyc_7413ryzen_pro_3200ge_firmwareryzen_pro_5350geepyc_7313ryzen_pro_3350g_firmwareepyc_7663_firmwareryzen_threadripper_pro_3955wxryzen_7_5800u_firmwareryzen_9_3900x_firmwareepyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareryzen_3_5425uepyc_7763epyc_7302_firmwareryzen_threadripper_pro_3955wx_firmwareryzen_5600xryzen_5300geepyc_7402_firmwareryzen_9_5980hx_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7702pryzen_threadripper_pro_3995wx_firmwareepyc_7f52_firmwareepyc_7262ryzen_5950xryzen_threadripper_pro_5965wxryzen_7_5800uryzen_pro_5650gryzen_9_5900hxepyc_72f3epyc_7643ryzen_5800x3dryzen_pro_3400geepyc_7402p_firmwareepyc_7452_firmwareryzen_threadripper_2990wxryzen_threadripper_3970xryzen_9_3950xryzen_pro_3600ryzen_3_3300gryzen_7_5800hepyc_7313_firmwareepyc_7543pryzen_pro_3400gepyc_7443pryzen_threadripper_3970x_firmwareryzen_5_3600ryzen_threadripper_pro_3945wxepyc_7453_firmwareryzen_threadripper_pro_3975wx_firmwareepyc_7282ryzen_7_5800hs_firmwareryzen_pro_5750gryzen_threadripper_pro_5995wx_firmwareepyc_7702_firmwareepyc_74f3epyc_7352_firmwareepyc_7532ryzen_5_5625u_firmwareepyc_73f3Athlon™ SeriesRyzen™ Series
CVE-2021-26343
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 10.83%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-09 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7313pepyc_7543epyc_7573xepyc_7663_firmwareepyc_7543p_firmwareepyc_7313_firmwareepyc_7313epyc_7413_firmwareepyc_7543pepyc_7643epyc_74f3epyc_7543_firmwareepyc_7443epyc_75f3epyc_7453epyc_7513epyc_7763_firmwareepyc_7343epyc_7773x_firmwareepyc_73f3_firmwareepyc_7713p_firmwareepyc_7713pepyc_7373xepyc_7443pepyc_7453_firmwareepyc_7773xepyc_7513_firmwareepyc_7713_firmwareepyc_72f3_firmwareepyc_7743epyc_7573x_firmwareepyc_7443p_firmwareepyc_73f3epyc_7763epyc_7313p_firmwareepyc_7743_firmwareepyc_7373x_firmwareepyc_7643_firmwareepyc_72f3epyc_74f3_firmwareepyc_75f3_firmwareepyc_7003_firmwareepyc_7713epyc_7343_firmwareepyc_7003epyc_7443_firmwareepyc_7413epyc_76633rd Gen EPYC
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-26361
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 33.13%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 17:46
Updated-17 Sep, 2024 | 01:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-athlon_3150geryzen_5_5600hathlon_3150g_firmwareryzen_3_5425cryzen_3_5425u_firmwareathlon_3050geryzen_5_5600uryzen_5_2500uryzen_9_5980hxryzen_3_2300u_firmwareryzen_7_5800hsryzen_5_5600xryzen_9_5900hx_firmwareryzen_5_5600hsryzen_3_2300uryzen_7_5825uryzen_5_2600xryzen_7_2700u_firmwareryzen_5_5625uryzen_5_5700geryzen_7_5825u_firmwareryzen_3_5125cryzen_7_2800h_firmwareryzen_5_5700gryzen_9_5900hs_firmwareryzen_5_5560uryzen_5_5600u_firmwareryzen_5_2500u_firmwareryzen_3_2200u_firmwareryzen_9_5900hsryzen_3_2200uryzen_7_2700xryzen_5_5700g_firmwareryzen_9_5980hsryzen_3_5125c_firmwareryzen_7_5800u_firmwareryzen_7_5825c_firmwareryzen_5_2600ryzen_7_2700ryzen_7_2700x_firmwareryzen_7_5800h_firmwareryzen_5_5625c_firmwareryzen_3_5425uryzen_5_2600hryzen_5_5625cryzen_5_5700ge_firmwareryzen_5_5560u_firmwareryzen_9_5980hx_firmwareryzen_7_2700uryzen_3_5400uradeon_softwareryzen_7_5825cryzen_5_2600h_firmwareryzen_7_5800uryzen_7_2800hathlon_3150gryzen_9_5900hxryzen_5_2600x_firmwareryzen_5_5600x_firmwareryzen_9_5980hs_firmwareryzen_5_5600hs_firmwareryzen_3_5425c_firmwareryzen_7_2700_firmwareathlon_3150ge_firmwareryzen_5_5600h_firmwareryzen_7_5800hryzen_3_5400u_firmwareryzen_5_2600_firmwareryzen_7_5800hs_firmwareryzen_5_5625u_firmwareathlon_3050ge_firmwareAthlon™ SeriesRyzen™ Series
CVE-2021-26393
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 31.47%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 20:44
Updated-16 Sep, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-amd_3020e_firmwareradeon_pro_w5500xryzen_5_3580uradeon_rx_vega_64ryzen_3_pro_3200ge_firmwareathlon_silver_3050u_firmwareathlon_silver_3050e_firmwareryzen_3_3250cradeon_rx_6600amd_3015eradeon_rx_5300ryzen_5_pro_3350ge_firmwareradeon_rx_vega_56ryzen_5_2500uathlon_gold_3150c_firmwareryzen_9_5980hxryzen_7_5800hsryzen_5_5600hsryzen_3_5300geryzen_3_2300uryzen_7_3750h_firmwareradeon_rx_6700sryzen_5_3400gradeon_rx_5700mamd_3020eathlon_pro_3145bryzen_5_5560uryzen_3_2200g_firmwareradeon_rx_5700ryzen_3_pro_3200geryzen_3_pro_3200g_firmwareryzen_5_2500u_firmwareradeon_rx_5700_xtryzen_3_pro_3200gryzen_7_3750hradeon_rx_5500mryzen_7_5700u_firmwareryzen_3_2200u_firmwareathlon_silver_3050eryzen_3_3200gryzen_7_3780uryzen_9_5900hsryzen_3_2200uradeon_rx_6500_xtryzen_3_3250c_firmwareradeon_rx_6950_xtryzen_7_5700gryzen_9_5980hsryzen_5_2400geryzen_7_3700cryzen_5_pro_3350g_firmwareryzen_5_5500u_firmwareryzen_7_5800h_firmwareenterprise_driverradeon_pro_softwareryzen_5_2600hryzen_5_3500uradeon_rx_5600mryzen_7_2700uryzen_3_5400uradeon_softwareathlon_pro_3045bryzen_7_2800hryzen_5_3550hradeon_rx_6700ryzen_7_3780u_firmwareradeon_rx_6400radeon_rx_6800athlon_silver_3050c_firmwareryzen_9_5980hs_firmwareryzen_5_pro_3350gryzen_3_5300gryzen_5_5600ge_firmwareryzen_5_3500c_firmwareryzen_5_3400g_firmwareryzen_5_5600hs_firmwareathlon_gold_3150uryzen_3_3350u_firmwareradeon_pro_w6800xradeon_rx_5600_xtryzen_5_5600h_firmwareryzen_5_5500uryzen_3_5400u_firmwareathlon_silver_3050cryzen_3_3300u_firmwareradeon_rx_6600sryzen_5_2400ge_firmwareryzen_5_2400gradeon_rx_6800sryzen_5_3580u_firmwareryzen_3_2200geryzen_5_3500cryzen_5_5600hryzen_5_pro_3400g_firmwareryzen_3_5300u_firmwareryzen_3_3300uryzen_3_5300uradeon_rx_6900_xtryzen_5_5600gryzen_5_3550h_firmwareryzen_5_5600uradeon_pro_w6400athlon_pro_3045b_firmwareryzen_3_2300u_firmwareradeon_rx_5500radeon_pro_w5700ryzen_9_5900hx_firmwareryzen_5_5600geradeon_rx_5300_xtryzen_7_3700u_firmwareryzen_3_5300ge_firmwareryzen_7_2700u_firmwareryzen_5_pro_3400gryzen_7_5700geryzen_5_3450uradeon_rx_6850m_xtryzen_3_2200ge_firmwareradeon_rx_6600_xtradeon_rx_6650_xtathlon_pro_3145b_firmwareryzen_7_2800h_firmwareryzen_5_pro_3350geryzen_7_5700uradeon_pro_w6600mradeon_pro_w6600xamd_3015ce_firmwareryzen_9_5900hs_firmwareradeon_pro_w6600ryzen_5_5600u_firmwareryzen_3_3200g_firmwareradeon_rx_6800_xtryzen_7_5700g_firmwareradeon_pro_w6900xradeon_rx_5300mradeon_pro_w6800radeon_rx_6600mradeon_pro_w5700xryzen_7_3700c_firmwareradeon_rx_6750_xtryzen_3_5300g_firmwareradeon_rx_5500_xtryzen_7_5800u_firmwareryzen_7_3700uathlon_silver_3050uryzen_3_2200gradeon_rx_6300mamd_3015ceryzen_5_5560u_firmwareryzen_9_5980hx_firmwareradeon_rx_6800mryzen_5_2600h_firmwareryzen_7_5800uradeon_rx_vega_56_firmwareradeon_rx_vega_64_firmwareryzen_9_5900hxradeon_pro_w6800x_duoradeon_rx_6650mradeon_rx_6650m_xtryzen_5_5600g_firmwareradeon_rx_6700_xtathlon_gold_3150cradeon_rx_6700mryzen_3_3250uryzen_5_2400g_firmwareathlon_gold_3150u_firmwareradeon_pro_w5500ryzen_5_pro_3400geradeon_rx_5600ryzen_7_5800hradeon_pro_w6500mryzen_5_3450u_firmwareamd_3015e_firmwareryzen_3_3250u_firmwareryzen_5_pro_3400ge_firmwareryzen_5_3500u_firmwareryzen_7_5800hs_firmwareradeon_pro_w6300mradeon_rx_6500mryzen_7_5700ge_firmwareryzen_3_3350uAMD Radeon RX 5000 Series & PRO W5000 SeriesAMD Ryzen™ Embedded V2000AMD Ryzen™ Embedded V1000AMD Radeon RX 6000 Series & PRO W6000 SeriesAMD Ryzen™ Embedded R2000AMD Ryzen™ Embedded R1000
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2021-26371
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.20%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 18:59
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_3_3250c_firmwareepyc_7552_firmwareryzen_5_5600_firmwareamd_3015ceepyc_7663ryzen_7_2700uryzen_threadripper_pro_5995wx_firmwareepyc_73f3_firmwareepyc_7402pepyc_74f3_firmwareepyc_73f3epyc_7252ryzen_7_3800xt_firmwareryzen_5_3500uryzen_7_3700uryzen_5_2500u_firmwareepyc_7352ryzen_3_3100_firmwareryzen_3_3250u_firmwareryzen_7_2800hepyc_7473xepyc_7501_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_threadripper_pro_5995wxryzen_9_3900xt_firmwareryzen_5_3450uryzen_9_5900x_firmwareryzen_5_3500epyc_7502epyc_7452ryzen_5_2400g_firmwareepyc_7002epyc_74f3epyc_7713pepyc_7251epyc_7551_firmwareryzen_5_3580u_firmwareryzen_7_3700c_firmwareepyc_7543ryzen_threadripper_3990xryzen_threadripper_pro_5955wxryzen_3_3250uepyc_7003epyc_7251_firmwareepyc_7351pryzen_9_5950xryzen_7_3700x_firmwareryzen_7_3800x_firmwareryzen_3_2200ge_firmwareryzen_7_2700u_firmwareryzen_5_2400geepyc_7373xepyc_7542_firmwareryzen_3_pro_2100geepyc_7373x_firmwareryzen_threadripper_pro_5975wx_firmwareepyc_72f3_firmwareepyc_7451_firmwareepyc_7773xepyc_7413epyc_7702p_firmwareryzen_5_5600x_firmwareepyc_7551ryzen_3_3350u_firmwareryzen_5_3550h_firmwareryzen_7_3700u_firmwareryzen_5_3550hepyc_7642_firmwareryzen_7_5800x3d_firmwareepyc_7262_firmwareepyc_7343ryzen_9_3950xepyc_7542epyc_7642ryzen_7_3780u_firmwareepyc_7272_firmwareepyc_7501ryzen_3_2200g_firmwareepyc_7401_firmwareryzen_5_5600ryzen_5_2400ge_firmwareepyc_7742epyc_72f3ryzen_threadripper_pro_5965wxryzen_threadripper_3990x_firmwareepyc_7601_firmwareepyc_7302pepyc_7763epyc_7413_firmwareepyc_7502_firmwareepyc_7313ryzen_3_3300xepyc_7443epyc_7302p_firmwareryzen_5_3580uepyc_7281epyc_7502p_firmwareepyc_7702pepyc_7001_firmwareryzen_3_2200geepyc_75f3ryzen_5_3500cryzen_threadripper_pro_5945wx_firmwareepyc_7313_firmwareryzen_threadripper_3970x_firmwareryzen_5_3500c_firmwareryzen_5_3600ryzen_3_pro_2100ge_firmwareryzen_9_5950x_firmwareepyc_7662_firmwareepyc_7f72ryzen_5_3600xryzen_3_2200uryzen_3_2300u_firmwareryzen_7_5700x_firmwareryzen_9_3900_firmwareepyc_7301_firmwareepyc_7451epyc_7282_firmwareepyc_7742_firmwareepyc_7371epyc_7532epyc_7313p_firmwareepyc_7262epyc_7h12ryzen_7_3750hepyc_7453ryzen_7_5800xepyc_7543_firmwareepyc_7552ryzen_3_2300uryzen_9_3900xryzen_5_5600xepyc_7351ryzen_5_3600xt_firmwareepyc_7302epyc_7f32_firmwareepyc_7573x_firmwareryzen_threadripper_pro_3995wx_firmwareepyc_7662ryzen_5_3500_firmwareepyc_7713p_firmwareepyc_7302_firmwareepyc_7702_firmwareepyc_7f52_firmwareryzen_9_3900xtepyc_7003_firmwareryzen_7_3700xryzen_threadripper_3960xepyc_7001ryzen_7_3800xtepyc_7513ryzen_5_2600h_firmwareryzen_5_3600x_firmwareryzen_3_2200gepyc_7402p_firmwareryzen_7_5800_firmwareepyc_7402epyc_7643epyc_7232p_firmwareepyc_7261ryzen_5_2500uryzen_3_3300uryzen_threadripper_3970xryzen_7_5800x3dryzen_9_5900_firmwareryzen_threadripper_pro_3955wxamd_3015ce_firmwareepyc_7702epyc_7h12_firmwareepyc_7452_firmwareryzen_threadripper_pro_5945wxepyc_7401pepyc_7543p_firmwareryzen_9_3900x_firmwareepyc_7272epyc_7513_firmwareryzen_5_3500xryzen_3_3300x_firmwareryzen_threadripper_pro_3945wxryzen_threadripper_3960x_firmwareryzen_3_3100epyc_7443pryzen_7_3700cryzen_7_3780uepyc_7f72_firmwareepyc_7301ryzen_3_3300u_firmwareryzen_5_3600xtepyc_7401epyc_7f52epyc_7f32epyc_7261_firmwareepyc_7402_firmwareepyc_7351_firmwareryzen_7_5700xepyc_75f3_firmwareryzen_5_3450u_firmwareamd_3015eryzen_5_3600_firmwareepyc_7443_firmwareepyc_7763_firmwareepyc_7401p_firmwareepyc_7252_firmwareryzen_5_2600hepyc_7643_firmwareepyc_7473x_firmwareepyc_7232pepyc_7532_firmwareepyc_7453_firmwareepyc_7351p_firmwareepyc_7551pryzen_3_3350uryzen_9_3900ryzen_5_5500_firmwareepyc_7543pryzen_9_3950x_firmwareryzen_3_2200u_firmwareryzen_9_5900ryzen_threadripper_pro_3955wx_firmwareryzen_3_3200u_firmwareryzen_5_3500x_firmwareryzen_threadripper_pro_3975wxryzen_threadripper_pro_3975wx_firmwareepyc_7551p_firmwareepyc_7663_firmwareepyc_7352_firmwareamd_3015e_firmwareryzen_7_2800h_firmwareryzen_threadripper_pro_3995wxryzen_7_5800epyc_7713_firmwareepyc_7371_firmwareepyc_7713epyc_7281_firmwareryzen_7_3750h_firmwareryzen_7_3800xepyc_7313pryzen_threadripper_pro_5975wxepyc_7773x_firmwareepyc_7573xepyc_7502pryzen_5_2400gepyc_7282ryzen_9_5900xryzen_5_3500u_firmwareryzen_5_5500epyc_7443p_firmwareepyc_7343_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3250cryzen_3_3200uepyc_7601epyc_7002_firmwareryzen_7_5800x_firmwareryzen_threadripper_pro_5955wx_firmwareRyzen™ 3000 Series Desktop Processors “Matisse” AM4Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”Ryzen™ Threadripper™ PRO Processors “Castle Peak” WSRyzen™ 2000 Series Mobile Processors “Raven Ridge” FP51st Gen AMD EPYC™ Processors2nd Gen AMD EPYC™ ProcessorsAthlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULP3rd Gen AMD EPYC™ ProcessorsRyzen™ 2000 series Desktop Processors “Raven Ridge” AM4Ryzen™ Threadripper™ PRO Processors “Chagall” WSAMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM43rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDTRyzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso”
CVE-2021-26314
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 27.63%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 11:23
Updated-17 Sep, 2024 | 02:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AMD Speculative execution with Floating-Point Value Injection

Potential floating point value injection in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution with incorrect floating point results, may cause the use of incorrect data from FPVI and may result in data leakage.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Intel CorporationFedora ProjectBroadcom Inc.Arm Limited
Product-core_i7-7700kryzen_5_5600xxeon_silver_4214fedoracore_i7-10700kryzen_threadripper_2990wxcortex-a72xenryzen_7_2700xcore_i9-9900kbcm2711All supported processors
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-26312
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.00%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 17:55
Updated-16 Sep, 2024 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7371_firmwareepyc_7443_firmwareepyc_7402pepyc_7451epyc_7261epyc_7282_firmwareepyc_7343epyc_7252_firmwareepyc_7543_firmwareepyc_7f32epyc_7542_firmwareepyc_7551_firmwareepyc_7763_firmwareepyc_7272_firmwareepyc_7713pepyc_7443epyc_7513epyc_7313p_firmwareepyc_7252epyc_7502pepyc_7232p_firmwareepyc_7702epyc_7351p_firmwareepyc_7302p_firmwareepyc_7453epyc_7642_firmwareepyc_7h12epyc_7452epyc_7513_firmwareepyc_7543p_firmwareepyc_7542epyc_7281_firmwareepyc_7413_firmwareepyc_7h12_firmwareepyc_7601epyc_7302epyc_7232pepyc_7643_firmwareepyc_7f52epyc_7663epyc_7552_firmwareepyc_75f3epyc_7371epyc_72f3_firmwareepyc_7f72epyc_7f32_firmwareepyc_7662epyc_7f72_firmwareepyc_7662_firmwareepyc_7502epyc_75f3_firmwareepyc_7642epyc_7451_firmwareepyc_7343_firmwareepyc_7532_firmwareepyc_7551epyc_7281epyc_7502p_firmwareepyc_7413epyc_7301epyc_7551pepyc_7313pepyc_7313epyc_7351pepyc_7551p_firmwareepyc_7663_firmwareepyc_7601_firmwareepyc_7351_firmwareepyc_7251epyc_7532epyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareepyc_7352epyc_7302_firmwareepyc_7763epyc_7401epyc_7713_firmwareepyc_7402_firmwareepyc_7742epyc_7713p_firmwareepyc_7272epyc_73f3_firmwareepyc_7702pepyc_7f52_firmwareepyc_7262epyc_7713epyc_7443p_firmwareepyc_7251_firmwareepyc_7401_firmwareepyc_72f3epyc_7643epyc_7452_firmwareepyc_7402p_firmwareepyc_7351epyc_7261_firmwareepyc_7543pepyc_7313_firmwareepyc_7443pepyc_7742_firmwareepyc_7453_firmwareepyc_7282epyc_7501epyc_7501_firmwareepyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7301_firmwareepyc_73f3Athlon™ SeriesRyzen™ SeriesEPYC™ Processors
CWE ID-CWE-665
Improper Initialization
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2017-5927
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 58.83%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern ARM processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.

Action-Not Available
Vendor-allwinnern/aAdvanced Micro Devices, Inc.SamsungIntel CorporationNVIDIA Corporation
Product-e-350celeron_n2840a64phenom_9550_4-corecore_i7-6700kcore_i7-3632qmcore_i7_920athlon_ii_640_x4core_i7-4500uexynos_5800core_i7-2620qmtegra_k1_cd570m-a1xeon_e5-2658_v2atom_c2750fx-8320_8-corefx-8120_8-corefx-8350_8-corecore_i5_m480xeon_e3-1240_v5tegra_k1_cd580m-a1n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5925
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 58.83%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern Intel processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.

Action-Not Available
Vendor-allwinnern/aAdvanced Micro Devices, Inc.SamsungIntel CorporationNVIDIA Corporation
Product-e-350celeron_n2840a64phenom_9550_4-corecore_i7-6700kcore_i7-3632qmcore_i7_920athlon_ii_640_x4core_i7-4500uexynos_5800core_i7-2620qmtegra_k1_cd570m-a1xeon_e5-2658_v2atom_c2750fx-8320_8-corefx-8120_8-corefx-8350_8-corecore_i5_m480xeon_e3-1240_v5tegra_k1_cd580m-a1n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2005-1036
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 26.09%
||
7 Day CHG~0.00%
Published-10 Apr, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FreeBSD 5.x to 5.4 on AMD64 does not properly initialize the IO permission bitmap used to allow user access to certain hardware, which allows local users to bypass intended access restrictions to cause a denial of service, obtain sensitive information, and possibly gain privileges.

Action-Not Available
Vendor-n/aFreeBSD FoundationAdvanced Micro Devices, Inc.
Product-amd64freebsdn/a
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2017-5926
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 58.83%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern AMD processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.

Action-Not Available
Vendor-allwinnern/aAdvanced Micro Devices, Inc.SamsungIntel CorporationNVIDIA Corporation
Product-e-350celeron_n2840a64phenom_9550_4-corecore_i7-6700kcore_i7-3632qmcore_i7_920athlon_ii_640_x4core_i7-4500uexynos_5800core_i7-2620qmtegra_k1_cd570m-a1xeon_e5-2658_v2atom_c2750fx-8320_8-corefx-8120_8-corefx-8350_8-corecore_i5_m480xeon_e3-1240_v5tegra_k1_cd580m-a1n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2018-21076
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.34%
||
7 Day CHG~0.00%
Published-08 Apr, 2020 | 17:12
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with N(7.x) (Exynos8890/8895 chipsets) software. There is information disclosure (a KASLR offset) in the Secure Driver via a modified trustlet. The Samsung ID is SVE-2017-10987 (April 2018).

Action-Not Available
Vendor-n/aGoogle LLCSamsung
Product-androidexynos_8895exynos_8890n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-1302
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-7.3||HIGH
EPSS-0.39% / 59.03%
||
7 Day CHG~0.00%
Published-12 Mar, 2024 | 15:26
Updated-26 Feb, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Vulnerabilities in Badger Meter's Monitool

Information exposure vulnerability in Badger Meter Monitool affecting versions up to 4.6.3 and earlier. A local attacker could change the application's file parameter to a log file obtaining all sensitive information such as database credentials.

Action-Not Available
Vendor-Badger Meter, Inc.
Product-monitoolMonitoolmoni\:\:tool
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-22529
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-6.3||MEDIUM
EPSS-0.02% / 4.21%
||
7 Day CHG~0.00%
Published-28 Aug, 2024 | 06:29
Updated-13 Sep, 2024 | 18:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sensitive Data Exposure leaks potential information in NetIQ Advance Authentication

A vulnerability identified in NetIQ Advance Authentication that leaks sensitive server information. This issue affects NetIQ Advance Authentication version before 6.3.5.1

Action-Not Available
Vendor-Open Text CorporationMicro Focus International Limited
Product-netiq_advanced_authenticationNetIQ Advance Authenticationnetiq_advanced_authentication
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-25357
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-5.6||MEDIUM
EPSS-0.02% / 3.08%
||
7 Day CHG~0.00%
Published-09 Apr, 2021 | 17:34
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A pendingIntent hijacking vulnerability in Create Movie prior to SMR APR-2021 Release 1 in Android O(8.x) and P(9.0), 3.4.81.1 in Android Q(10,0), and 3.6.80.7 in Android R(11.0) allows unprivileged applications to access contact information.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2010-3078
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.28%
||
7 Day CHG~0.00%
Published-21 Sep, 2010 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSECanonical Ltd.VMware (Broadcom Inc.)openSUSE
Product-linux_kernelubuntu_linuxopensusesuse_linux_enterprise_desktopsuse_linux_enterprise_serveresxn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-2538
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.29%
||
7 Day CHG~0.00%
Published-30 Sep, 2010 | 14:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the Linux kernel before 2.6.35 might allow local users to obtain sensitive information via a BTRFS_IOC_CLONE_RANGE ioctl call.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSECanonical Ltd.
Product-linux_kernelubuntu_linuxlinux_enterprise_serverlinux_enterprise_desktoplinux_enterprise_high_availability_extensionn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-21364
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.08% / 24.27%
||
7 Day CHG~0.00%
Published-11 Mar, 2021 | 03:05
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Generated Code Contains Local Information Disclosure Vulnerability

swagger-codegen is an open-source project which contains a template-driven engine to generate documentation, API clients and server stubs in different languages by parsing your OpenAPI / Swagger definition. In swagger-codegen before version 2.4.19, on Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used. Because this vulnerability impacts generated code, the generated code will remain vulnerable until fixed manually! This vulnerability is fixed in version 2.4.19. Note this is a distinct vulnerability from CVE-2021-21363.

Action-Not Available
Vendor-smartbearswagger-api
Product-swagger-codegenswagger-codegen
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-378
Creation of Temporary File With Insecure Permissions
CVE-2010-1457
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.13% / 33.83%
||
7 Day CHG~0.00%
Published-12 May, 2010 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tools/gdomap.c in gdomap in GNUstep Base before 1.20.0 allows local users to read arbitrary files via a (1) -c or (2) -a option, which prints file contents in an error message.

Action-Not Available
Vendor-gnustepn/a
Product-gnustep_basen/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2015-7487
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4.1||MEDIUM
EPSS-0.05% / 15.92%
||
7 Day CHG~0.00%
Published-27 Jan, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Maximo Asset Management 7.1 through 7.1.1.13, 7.5.0 before 7.5.0.9 IFIX002, and 7.6.0 before 7.6.0.3 IFIX001; Maximo Asset Management 7.5.0 before 7.5.0.9 IFIX002, 7.5.1, and 7.6.0 before 7.6.0.3 IFIX001 for SmartCloud Control Desk; and Maximo Asset Management 7.1 through 7.1.1.13 and 7.2 for Tivoli IT Asset Management for IT and certain other products allow local users to obtain sensitive information by leveraging administrative privileges and reading log files.

Action-Not Available
Vendor-n/aIBM Corporation
Product-maximo_for_life_sciencesmaximo_for_governmentsmartcloud_control_deskmaximo_asset_management_essentialsmaximo_for_nuclear_powerchange_and_configuration_management_databasetivoli_service_request_managermaximo_for_transportationmaximo_for_oil_and_gasmaximo_asset_managementtivoli_asset_management_for_itmaximo_for_energy_optimizationmaximo_for_utilitiesn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-21536
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.2||MEDIUM
EPSS-0.06% / 17.66%
||
7 Day CHG~0.00%
Published-30 Apr, 2021 | 17:40
Updated-17 Sep, 2024 | 04:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to register the client to a server in order to view sensitive information.

Action-Not Available
Vendor-Dell Inc.
Product-hybrid_clientDell Hybrid Client (DHC)
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-1363
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-1.62% / 81.11%
||
7 Day CHG~0.00%
Published-10 Oct, 2019 | 13:28
Updated-04 Aug, 2024 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system, aka 'Windows GDI Information Disclosure Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_7windows_server_2008WindowsWindows Server
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-1474
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-1.62% / 81.11%
||
7 Day CHG~0.00%
Published-10 Dec, 2019 | 21:41
Updated-04 Aug, 2024 | 18:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1472.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10windows_server_2019windows_server_2008WindowsWindows 10 Version 1909 for x64-based SystemsWindows 10 Version 1903 for x64-based SystemsWindows ServerWindows 10 Version 1903 for ARM64-based SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows Server, version 1909 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows Server, version 1903 (Server Core installation)Windows 10 Version 1909 for 32-bit Systems
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2009-3002
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.30% / 53.17%
||
7 Day CHG~0.00%
Published-28 Aug, 2009 | 15:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-34712
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-4.76% / 89.03%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 19:54
Updated-29 May, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Defender Credential Guard Information Disclosure Vulnerability

Windows Defender Credential Guard Information Disclosure Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10windows_11windows_server_2016windows_server_2022Windows Server version 20H2Windows 11 version 21H2Windows 10 Version 21H1Windows 10 Version 21H2Windows 10 Version 20H2Windows Server 2022
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-0020
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.96%
||
7 Day CHG~0.00%
Published-16 Feb, 2024 | 19:33
Updated-19 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In onActivityResult of NotificationSoundPreference.java, there is a possible way to hear audio files belonging to a different user due to a confused deputy. This could lead to local information disclosure across users of a device with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroid
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-34355
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4||MEDIUM
EPSS-0.02% / 3.77%
||
7 Day CHG~0.00%
Published-06 Oct, 2023 | 20:43
Updated-19 Sep, 2024 | 14:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Jazz Foundation information disclosure

IBM Jazz Foundation (IBM Engineering Lifecycle Management 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2) could disclose sensitive version information to a user that could be used in further attacks against the system. IBM X-Force ID: 230498.

Action-Not Available
Vendor-IBM Corporation
Product-engineering_lifecycle_managementcollaborative_lifecycle_managementEngineering Lifecycle Management
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-1158
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.90% / 74.68%
||
7 Day CHG~0.00%
Published-14 Aug, 2019 | 20:55
Updated-04 Aug, 2024 | 18:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Graphics Component Information Disclosure Vulnerability

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage. The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10windows_server_2019windows_server_2008Windows 10 Version 1607Windows Server 2019 (Server Core installation)Windows 10 Version 1903 for x64-based SystemsWindows Server 2008 R2 Systems Service Pack 1Windows 10 Version 1903 for ARM64-based SystemsWindows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows 8.1Windows 7Windows Server 2012 (Server Core installation)Windows Server, version 1803 (Server Core Installation)Windows 10 Version 1709Windows 7 Service Pack 1Windows Server 2016Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows 10 Version 1803Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows Server, version 1903 (Server Core installation)Windows 10 Version 1709 for 32-bit SystemsWindows 10 Version 1703
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-0093
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 31.26%
||
7 Day CHG~0.00%
Published-13 Jun, 2024 | 21:23
Updated-19 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE

NVIDIA GPU software for Linux contains a vulnerability where it can expose sensitive information to an actor that is not explicitly authorized to have access to that information. A successful exploit of this vulnerability might lead to information disclosure.

Action-Not Available
Vendor-VMware (Broadcom Inc.)NVIDIA CorporationRed Hat, Inc.Canonical Ltd.Citrix (Cloud Software Group, Inc.)
Product-ubuntu_linuxenterprise_linux_kernel-based_virtual_machinevirtual_gpuhypervisorvspherecloud_gamingvGPU software and Cloud Gaming
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-21537
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-6.2||MEDIUM
EPSS-0.06% / 17.66%
||
7 Day CHG~0.00%
Published-30 Apr, 2021 | 17:40
Updated-16 Sep, 2024 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnerability. A local unauthenticated attacker may exploit this vulnerability in order to view and exfiltrate sensitive information on the system.

Action-Not Available
Vendor-Dell Inc.
Product-hybrid_clientDell Hybrid Client (DHC)
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2009-1870
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.19% / 40.87%
||
7 Day CHG~0.00%
Published-31 Jul, 2009 | 19:00
Updated-07 Aug, 2024 | 05:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Flash Player before 9.0.246.0 and 10.x before 10.0.32.18, and Adobe AIR before 1.5.2, allows attackers to obtain sensitive information via vectors involving saving an SWF file to a hard drive, related to a "local sandbox vulnerability."

Action-Not Available
Vendor-n/aAdobe Inc.
Product-flash_playerflexairn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-34710
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-4.68% / 88.91%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 19:54
Updated-29 May, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Defender Credential Guard Information Disclosure Vulnerability

Windows Defender Credential Guard Information Disclosure Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2022windows_server_2019windows_10windows_11windows_server_2016Windows Server 2019 (Server Core installation)Windows Server 2016Windows 10 Version 1607Windows Server 2019Windows Server version 20H2Windows 11 version 21H2Windows Server 2016 (Server Core installation)Windows 10 Version 1507Windows 10 Version 21H1Windows 10 Version 1809Windows 10 Version 20H2Windows 10 Version 21H2Windows Server 2022
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-0340
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 0.24%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 17:36
Updated-30 Jul, 2025 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel: information disclosure in vhost/vhost.c:vhost_new_msg()

A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.

Action-Not Available
Vendor-Red Hat, Inc.Linux Kernel Organization, Inc
Product-linux_kernelRed Hat Enterprise Linux 9Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8Red Hat Enterprise Linux 7Red Hat Enterprise Linux 9.4 Extended Update Support
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2009-2711
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.07% / 20.88%
||
7 Day CHG~0.00%
Published-07 Aug, 2009 | 18:33
Updated-07 Aug, 2024 | 05:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

XScreenSaver in Sun Solaris 9 and 10, OpenSolaris before snv_120, and X11 6.4.1 for Solaris 8, when the Xorg or Xnewt server is used, allows physically proximate attackers to obtain sensitive information by reading popup windows, which are displayed even when the screen is locked, a different vulnerability than CVE-2009-1276.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)X.Org Foundation
Product-opensolarissolarisx11n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 7
  • 8
  • Next
Details not found