Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-26333

Summary
Assigner-AMD
Assigner Org ID-b58fc414-a1e4-4f92-9d70-1add41838648
Published At-21 Sep, 2021 | 10:49
Updated At-16 Sep, 2024 | 22:08
Rejected At-
Credits

AMD Chipset Driver Information Disclosure Vulnerability

An information disclosure vulnerability exists in AMD Platform Security Processor (PSP) chipset driver. The discretionary access control list (DACL) may allow low privileged users to open a handle and send requests to the driver resulting in a potential data leak from uninitialized physical pages.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:AMD
Assigner Org ID:b58fc414-a1e4-4f92-9d70-1add41838648
Published At:21 Sep, 2021 | 10:49
Updated At:16 Sep, 2024 | 22:08
Rejected At:
▼CVE Numbering Authority (CNA)
AMD Chipset Driver Information Disclosure Vulnerability

An information disclosure vulnerability exists in AMD Platform Security Processor (PSP) chipset driver. The discretionary access control list (DACL) may allow low privileged users to open a handle and send requests to the driver resulting in a potential data leak from uninitialized physical pages.

Affected Products
Vendor
Advanced Micro Devices, Inc.AMD
Product
PSP Driver
Versions
Affected
  • From PSP Driver before 5.17.0.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-200CWE-200 Information Exposure
Type: CWE
CWE ID: CWE-200
Description: CWE-200 Information Exposure
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://seclists.org/fulldisclosure/2021/Sep/24
mailing-list
x_refsource_FULLDISC
http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
x_refsource_MISC
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009
x_refsource_MISC
Hyperlink: http://seclists.org/fulldisclosure/2021/Sep/24
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
Resource:
x_refsource_MISC
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://seclists.org/fulldisclosure/2021/Sep/24
mailing-list
x_refsource_FULLDISC
x_transferred
http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
x_refsource_MISC
x_transferred
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009
x_refsource_MISC
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2021/Sep/24
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@amd.com
Published At:21 Sep, 2021 | 11:15
Updated At:26 Apr, 2022 | 15:33

An information disclosure vulnerability exists in AMD Platform Security Processor (PSP) chipset driver. The discretionary access control list (DACL) may allow low privileged users to open a handle and send requests to the driver resulting in a potential data leak from uninitialized physical pages.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.04.9MEDIUM
AV:L/AC:L/Au:N/C:C/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 4.9
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N
CPE Matches

Advanced Micro Devices, Inc.
amd
>>chipset_driver>>Versions before 3.08.17.735(exclusive)
cpe:2.3:a:amd:chipset_driver:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>psp_driver>>Versions before 5.17.0.0(exclusive)
cpe:2.3:a:amd:psp_driver:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-909Primarynvd@nist.gov
CWE-200Secondarypsirt@amd.com
CWE ID: CWE-909
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-200
Type: Secondary
Source: psirt@amd.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.htmlpsirt@amd.com
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2021/Sep/24psirt@amd.com
Mailing List
Third Party Advisory
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009psirt@amd.com
Vendor Advisory
Hyperlink: http://packetstormsecurity.com/files/164202/AMD-Chipset-Driver-Information-Disclosure-Memory-Leak.html
Source: psirt@amd.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2021/Sep/24
Source: psirt@amd.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1009
Source: psirt@amd.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

410Records found

CVE-2020-12987
Matching Score-10
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-10
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 17.98%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 21:50
Updated-17 Sep, 2024 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwareradeon_pro_softwarewindows_10AMD Radeon Software
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-12966
Matching Score-10
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-10
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 33.84%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:29
Updated-17 Sep, 2024 | 01:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_embedded_7f72_firmwareepyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7371_firmwareepyc_embedded_7371_firmwareepyc_embedded_7501epyc_7261epyc_7451epyc_7282_firmwareepyc_embedded_7f32epyc_7f32epyc_embedded_3251_firmwareepyc_7551_firmwareepyc_7272_firmwareepyc_embedded_7282epyc_7713pepyc_embedded_7451epyc_7443epyc_7513epyc_embedded_3201_firmwareepyc_embedded_7502p_firmwareepyc_embedded_7542_firmwareepyc_7232p_firmwareepyc_7702epyc_embedded_7702pepyc_7453epyc_7513_firmwareepyc_embedded_7262epyc_7542epyc_embedded_740p_firmwareepyc_7281_firmwareepyc_7413_firmwareepyc_7h12_firmwareepyc_7002epyc_7643_firmwareepyc_7f52epyc_embedded_3151_firmwareepyc_75f3epyc_7001epyc_embedded_7642_firmwareepyc_7f32_firmwareepyc_7502epyc_75f3_firmwareepyc_7001_firmwareepyc_7662_firmwareepyc_7f72_firmwareepyc_7343_firmwareepyc_7281epyc_7551epyc_embedded_740pepyc_embedded_7662epyc_7551pepyc_7313pepyc_7002_firmwareepyc_embedded_3101epyc_embedded_7302epyc_embedded_7642epyc_7551p_firmwareepyc_embedded_7551_firmwareepyc_embedded_7f32_firmwareepyc_embedded_7h12epyc_7601_firmwareepyc_embedded_3451_firmwareepyc_7352epyc_embedded_7301epyc_embedded_7401_firmwareepyc_7713_firmwareepyc_7401epyc_7742epyc_embedded_7252_firmwareepyc_7272epyc_7713epyc_7003_firmwareepyc_7443p_firmwareepyc_embedded_7742_firmwareepyc_7003epyc_embedded_3351_firmwareepyc_embedded_7402_firmwareepyc_embedded_7402p_firmwareepyc_embedded_3451epyc_embedded_7261epyc_embedded_7352_firmwareepyc_7261_firmwareepyc_embedded_7301_firmwareepyc_embedded_7232p_firmwareepyc_embedded_3201epyc_embedded_7532epyc_embedded_7302pepyc_embedded_7h12_firmwareepyc_7742_firmwareepyc_embedded_7261_firmwareepyc_7501epyc_7501_firmwareepyc_embedded_7452epyc_embedded_7272epyc_embedded_7552epyc_7301_firmwareepyc_embedded_7502pepyc_embedded_7371epyc_embedded_7451_firmwareepyc_7443_firmwareepyc_7402pepyc_7343epyc_embedded_7742epyc_7252_firmwareepyc_7543_firmwareepyc_embedded_7501_firmwareepyc_embedded_755pepyc_7542_firmwareepyc_7763_firmwareepyc_embedded_7302p_firmwareepyc_embedded_7502_firmwareepyc_embedded_7232pepyc_embedded_735pepyc_embedded_7351_firmwareepyc_7313p_firmwareepyc_7252epyc_7502pepyc_embedded_7252epyc_7302p_firmwareepyc_7351p_firmwareepyc_embedded_7f52_firmwareepyc_embedded_3251epyc_embedded_755p_firmwareepyc_embedded_3101_firmwareepyc_7642_firmwareepyc_embedded_7532_firmwareepyc_7452epyc_7h12epyc_embedded_7601_firmwareepyc_7543p_firmwareepyc_embedded_7402epyc_7401pepyc_embedded_7f72epyc_7302epyc_7601epyc_embedded_3255_firmwareepyc_embedded_7601epyc_7232pepyc_embedded_7302_firmwareepyc_embedded_7401epyc_7663epyc_7552_firmwareepyc_embedded_3351epyc_embedded_7702_firmwareepyc_72f3_firmwareepyc_7371epyc_embedded_7251_firmwareepyc_7f72epyc_7662epyc_7642epyc_7451_firmwareepyc_7532_firmwareepyc_embedded_7281_firmwareepyc_embedded_7542epyc_7502p_firmwareepyc_embedded_7662_firmwareepyc_7413epyc_7301epyc_7401p_firmwareepyc_embedded_7551epyc_7313epyc_7351pepyc_embedded_7282_firmwareepyc_7663_firmwareepyc_embedded_7702p_firmwareepyc_7351_firmwareepyc_7251epyc_7552epyc_7302pepyc_7702p_firmwareepyc_embedded_7552_firmwareepyc_74f3_firmwareepyc_7763epyc_7302_firmwareepyc_embedded_3151epyc_embedded_3255epyc_7402_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7702pepyc_embedded_7402pepyc_embedded_7281epyc_7f52_firmwareepyc_7262epyc_embedded_7262_firmwareepyc_embedded_7352epyc_embedded_7702epyc_embedded_7452_firmwareepyc_7251_firmwareepyc_7401_firmwareepyc_72f3epyc_7643epyc_embedded_7251epyc_embedded_735p_firmwareepyc_7402p_firmwareepyc_7452_firmwareepyc_7351epyc_7543pepyc_7313_firmwareepyc_embedded_7272_firmwareepyc_7443pepyc_7453_firmwareepyc_7282epyc_embedded_7f52epyc_embedded_7502epyc_7702_firmwareepyc_74f3epyc_7352_firmwareepyc_7532epyc_embedded_7351epyc_73f31st/2nd/3rd Gen AMD EPYC™ Processors
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-23824
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.57%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 20:48
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.

Action-Not Available
Vendor-Xen ProjectFedora ProjectAdvanced Micro Devices, Inc.
Product-epyc_7543ryzen_5_3580uepyc_7402athlon_silver_3050u_firmwareepyc_7f32epyc_7713pepyc_7443epyc_7513athlon_x4_880k_firmwareryzen_7_4700geryzen_5_2500uathlon_x4_940_firmwareryzen_9_5980hxryzen_5_5600hsathlon_x4_830_firmwareryzen_3_2300uryzen_7_5825uryzen_7_5825u_firmwareepyc_7542ryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7413_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_2950xryzen_5_2700_firmwareryzen_5_4500u_firmwareathlon_x4_760kepyc_7002epyc_7643_firmwareepyc_7f52ryzen_threadripper_pro_5945wxryzen_7_pro_3700u_firmwareepyc_7373x_firmwareryzen_5_2500u_firmwareryzen_3_4300g_firmwareepyc_7f32_firmwareryzen_7_3750hepyc_7001_firmwareepyc_75f3_firmwareepyc_7473x_firmwareryzen_3_2200u_firmwarea12-9730pepyc_7281ryzen_3_2200uepyc_7551p_firmwareryzen_threadripper_2920xepyc_7601_firmwareryzen_7_5825c_firmwareepyc_7573x_firmwareryzen_5_2600ryzen_7_2700x_firmwareryzen_5_2600hathlon_x4_750ryzen_5_3500uepyc_7401ryzen_3_5400uepyc_7713ryzen_5_3550hryzen_5_4500uryzen_threadripper_3990x_firmwareryzen_7_3780u_firmwareryzen_3_4300uepyc_7003ryzen_7_4800h_firmwareryzen_3_4300u_firmwareryzen_9_5980hs_firmwareryzen_7_3700x_firmwareryzen_threadripper_3990xryzen_5_3400g_firmwareathlon_x4_835_firmwareryzen_7_2700_firmwareryzen_5_5600h_firmwareryzen_5_2700xryzen_3_4300geryzen_5_2600_firmwareryzen_7_4700uepyc_7501a6-9220c_firmwareathlon_x4_970_firmwareathlon_x4_870kryzen_5_3600_firmwareryzen_5_3580u_firmwareryzen_5_4600hryzen_3_3200u_firmwareepyc_7443_firmwareathlon_x4_940athlon_x4_750_firmwareryzen_3_3300x_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7543_firmwarea4-9120_firmwareepyc_7542_firmwareryzen_3_3300ua6-9210ryzen_threadripper_pro_5945wx_firmwareepyc_7313p_firmwareryzen_7_4800hepyc_7252ryzen_5_5600uryzen_5_3550h_firmwareryzen_5_3450gepyc_7502pepyc_7351p_firmwareryzen_9_4900hryzen_7_pro_3700ufedoraathlon_x4_840ryzen_7_3700u_firmwareathlon_x4_860k_firmwareryzen_7_2700u_firmwareryzen_5_2700epyc_7601ryzen_7_3800x_firmwarea6-9220ryzen_7_2800h_firmwarea10-9600p_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_9_5900hs_firmwareepyc_72f3_firmwareepyc_7662a10-9630p_firmwareepyc_7642ryzen_threadripper_pro_5975wx_firmwareepyc_7502p_firmwareryzen_5_4600h_firmwareepyc_7413ryzen_7_2700xepyc_7313ryzen_threadripper_pro_3955wxepyc_7663_firmwareryzen_3_3200uryzen_7_3700uepyc_7251epyc_7351_firmwareathlon_x4_830epyc_7302pathlon_silver_3050uepyc_74f3_firmwareryzen_3_5425uryzen_5_4600gepyc_7763ryzen_threadripper_pro_3955wx_firmwareathlon_x4_835athlon_x4_845_firmwareepyc_7402_firmwareryzen_9_5980hx_firmwareepyc_7713p_firmwareathlon_x4_760k_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareathlon_x4_845ryzen_7_5825cryzen_7_5800uepyc_7251_firmwareepyc_7401_firmwareathlon_x4_860ka4-9120epyc_7402p_firmwareryzen_threadripper_2990wxryzen_3_4300ge_firmwareryzen_threadripper_3970xryzen_3_5425c_firmwareepyc_7351ryzen_7_5800hepyc_7543pryzen_threadripper_3970x_firmwareryzen_7_4800uepyc_7502_firmwareryzen_5_2700x_firmwareepyc_7262_firmwareryzen_7_4800u_firmwareepyc_7371_firmwareathlon_x4_870k_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7551_firmwareepyc_7272_firmwareepyc_7573xryzen_3_3100_firmwareryzen_threadripper_2950x_firmwarea9-9410_firmwareepyc_7702ryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwarea9-9420_firmwareryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_3600xt_firmwareepyc_7373xepyc_7513_firmwareryzen_5_3600x_firmwareryzen_7_3750h_firmwareepyc_7h12_firmwareryzen_threadripper_3960xryzen_5_5560uepyc_75f3epyc_7001ryzen_3_3100epyc_7502epyc_7f72_firmwareepyc_7662_firmwareepyc_7343_firmwareryzen_7_3780uepyc_7551athlon_x4_840_firmwareryzen_9_5900hsepyc_7551pepyc_7313pepyc_7002_firmwareryzen_9_5980hsathlon_x4_970a10-9630pathlon_x4_950_firmwareryzen_3_5125c_firmwareryzen_7_3800xt_firmwareryzen_7_2700ryzen_7_5800h_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xryzen_5_5625c_firmwareepyc_7352ryzen_5_5625cepyc_7713_firmwareepyc_7742epyc_7272ryzen_7_2700uryzen_5_3450g_firmwarea10-9600pryzen_9_4900h_firmwareryzen_5_4600geepyc_7003_firmwareepyc_7443p_firmwareryzen_7_2800hepyc_7773xryzen_5_2600x_firmwareryzen_5_5600hs_firmwareepyc_7261_firmwareathlon_gold_3150uryzen_threadripper_pro_5955wxryzen_3_5400u_firmwareepyc_7742_firmwareryzen_threadripper_pro_3795wxryzen_3_3300u_firmwareryzen_7_3800xepyc_7501_firmwarea12-9730p_firmwareryzen_5_4600uepyc_7301_firmwareryzen_threadripper_2990wx_firmwareryzen_5_4600u_firmwareryzen_5_5600hepyc_7763_firmwareryzen_3_5425cryzen_3_3300g_firmwareryzen_5_3600xtryzen_3_5425u_firmwareryzen_threadripper_pro_5975wxryzen_3_2300u_firmwarea12-9700pepyc_7302p_firmwarea12-9700p_firmwareryzen_9_5900hx_firmwarea9-9420epyc_7642_firmwareryzen_threadripper_2970wxepyc_7452epyc_7h12a6-9220_firmwareepyc_7543p_firmwareryzen_5_2600xryzen_5_5625uryzen_threadripper_2920x_firmwareepyc_7401pryzen_3_4300gepyc_7302ryzen_3_5125cryzen_7_4700g_firmwareepyc_7663ryzen_5_5600u_firmwareepyc_7552_firmwareepyc_7773x_firmwareryzen_5_3600xepyc_7371epyc_7f72ryzen_7_3800xtryzen_threadripper_2970wx_firmwareepyc_7473xepyc_7451_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7301epyc_7401p_firmwareepyc_7351pryzen_7_4700ge_firmwareryzen_7_5800u_firmwareryzen_7_4700u_firmwareepyc_7532a6-9220cepyc_7552athlon_x4_950epyc_7302_firmwarea6-9210_firmwarea9-9410ryzen_5_5560u_firmwareepyc_7262ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxxenryzen_9_5900hxryzen_3_3250uepyc_72f3epyc_7643athlon_gold_3150u_firmwareepyc_7452_firmwareryzen_3_3300gepyc_7313_firmwareepyc_7443pryzen_3_3250u_firmwareathlon_x4_880kryzen_5_3600ryzen_threadripper_pro_3945wxryzen_5_3500u_firmwareryzen_7_5800hs_firmwareryzen_5_4600ge_firmwareepyc_7282ryzen_threadripper_pro_5995wx_firmwareryzen_5_5625u_firmwareepyc_7352_firmwareepyc_74f3epyc_7702_firmwareAMD Processors
CVE-2021-46766
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-2.5||LOW
EPSS-0.02% / 5.07%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:51
Updated-04 Aug, 2024 | 05:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_9124_firmwareepyc_9684xepyc_9254_firmwareryzen_threadripper_pro_3955wxepyc_9354pepyc_9474fepyc_9754sepyc_9274fepyc_9734epyc_9454pepyc_9654pepyc_9684x_firmwareepyc_9734_firmwareepyc_9454_firmwareepyc_9384xryzen_threadripper_pro_3955wx_firmwareepyc_9534epyc_9374fepyc_9124epyc_9354epyc_9254epyc_9654p_firmwareryzen_threadripper_pro_3995wx_firmwareepyc_9334epyc_9474f_firmwareepyc_9374f_firmwareepyc_9334_firmwareepyc_9454p_firmwareepyc_9454epyc_9554_firmwareepyc_9534_firmwareepyc_9754_firmwareepyc_9384x_firmwareryzen_threadripper_pro_3975wxryzen_threadripper_pro_3945wx_firmwareepyc_9354_firmwareepyc_9274f_firmwareepyc_9634epyc_9554p_firmwareepyc_9354p_firmwareepyc_9224_firmwareepyc_9174fryzen_threadripper_pro_3945wxepyc_9184xepyc_9184x_firmwareepyc_9754ryzen_threadripper_pro_3975wx_firmwareepyc_9224epyc_9754s_firmwareryzen_threadripper_pro_3995wxepyc_9634_firmwareepyc_9554epyc_9174f_firmwareepyc_9654_firmwareepyc_9554pepyc_9654AMD EPYC™ Embedded 90034th Gen AMD EPYC™ ProcessorsRyzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS
CWE ID-CWE-459
Incomplete Cleanup
CVE-2021-26407
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 33.63%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-08 Apr, 2025 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A randomly generated Initialization Vector (IV) may lead to a collision of IVs with the same key potentially resulting in information disclosure.

Action-Not Available
Vendor-AMDAdvanced Micro Devices, Inc.
Product-romepiromepi_firmware2nd Gen EPYC
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-26404
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 33.63%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-08 Apr, 2025 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7313epyc_7443_firmwareepyc_7343epyc_7663_firmwareepyc_7543_firmwareepyc_7763_firmwareepyc_7573x_firmwareepyc_7573xepyc_7713pepyc_7443epyc_74f3_firmwareepyc_7513epyc_7313p_firmwareepyc_7763epyc_7713_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7453epyc_7373xepyc_7713epyc_7003_firmwareepyc_7443p_firmwareepyc_7513_firmwareepyc_7543p_firmwareepyc_7773xepyc_7003epyc_7413_firmwareepyc_7643epyc_7643_firmwareepyc_7663epyc_7773x_firmwareepyc_75f3epyc_7373x_firmwareepyc_7313_firmwareepyc_7543pepyc_7443pepyc_75f3_firmwareepyc_7473xepyc_7453_firmwareepyc_7343_firmwareepyc_7473x_firmwareepyc_74f3epyc_7413epyc_7313pepyc_73f33rd Gen EPYC
CWE ID-CWE-20
Improper Input Validation
CVE-2021-26371
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 20.65%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 18:59
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_3_3250c_firmwareepyc_7552_firmwareryzen_5_5600_firmwareamd_3015ceepyc_7663ryzen_7_2700uryzen_threadripper_pro_5995wx_firmwareepyc_73f3_firmwareepyc_7402pepyc_74f3_firmwareepyc_73f3epyc_7252ryzen_7_3800xt_firmwareryzen_5_3500uryzen_7_3700uryzen_5_2500u_firmwareepyc_7352ryzen_3_3100_firmwareryzen_3_3250u_firmwareryzen_7_2800hepyc_7473xepyc_7501_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_threadripper_pro_5995wxryzen_9_3900xt_firmwareryzen_5_3450uryzen_9_5900x_firmwareryzen_5_3500epyc_7502epyc_7452ryzen_5_2400g_firmwareepyc_7002epyc_74f3epyc_7713pepyc_7251epyc_7551_firmwareryzen_5_3580u_firmwareryzen_7_3700c_firmwareepyc_7543ryzen_threadripper_3990xryzen_threadripper_pro_5955wxryzen_3_3250uepyc_7003epyc_7251_firmwareepyc_7351pryzen_9_5950xryzen_7_3700x_firmwareryzen_7_3800x_firmwareryzen_3_2200ge_firmwareryzen_7_2700u_firmwareryzen_5_2400geepyc_7373xepyc_7542_firmwareryzen_3_pro_2100geepyc_7373x_firmwareryzen_threadripper_pro_5975wx_firmwareepyc_72f3_firmwareepyc_7451_firmwareepyc_7773xepyc_7413epyc_7702p_firmwareryzen_5_5600x_firmwareepyc_7551ryzen_3_3350u_firmwareryzen_5_3550h_firmwareryzen_7_3700u_firmwareryzen_5_3550hepyc_7642_firmwareryzen_7_5800x3d_firmwareepyc_7262_firmwareepyc_7343ryzen_9_3950xepyc_7542epyc_7642ryzen_7_3780u_firmwareepyc_7272_firmwareepyc_7501ryzen_3_2200g_firmwareepyc_7401_firmwareryzen_5_5600ryzen_5_2400ge_firmwareepyc_7742epyc_72f3ryzen_threadripper_pro_5965wxryzen_threadripper_3990x_firmwareepyc_7601_firmwareepyc_7302pepyc_7763epyc_7413_firmwareepyc_7502_firmwareepyc_7313ryzen_3_3300xepyc_7443epyc_7302p_firmwareryzen_5_3580uepyc_7281epyc_7502p_firmwareepyc_7702pepyc_7001_firmwareryzen_3_2200geepyc_75f3ryzen_5_3500cryzen_threadripper_pro_5945wx_firmwareepyc_7313_firmwareryzen_threadripper_3970x_firmwareryzen_5_3500c_firmwareryzen_5_3600ryzen_3_pro_2100ge_firmwareryzen_9_5950x_firmwareepyc_7662_firmwareepyc_7f72ryzen_5_3600xryzen_3_2200uryzen_3_2300u_firmwareryzen_7_5700x_firmwareryzen_9_3900_firmwareepyc_7301_firmwareepyc_7451epyc_7282_firmwareepyc_7742_firmwareepyc_7371epyc_7532epyc_7313p_firmwareepyc_7262epyc_7h12ryzen_7_3750hepyc_7453ryzen_7_5800xepyc_7543_firmwareepyc_7552ryzen_3_2300uryzen_9_3900xryzen_5_5600xepyc_7351ryzen_5_3600xt_firmwareepyc_7302epyc_7f32_firmwareepyc_7573x_firmwareryzen_threadripper_pro_3995wx_firmwareepyc_7662ryzen_5_3500_firmwareepyc_7713p_firmwareepyc_7302_firmwareepyc_7702_firmwareepyc_7f52_firmwareryzen_9_3900xtepyc_7003_firmwareryzen_7_3700xryzen_threadripper_3960xepyc_7001ryzen_7_3800xtepyc_7513ryzen_5_2600h_firmwareryzen_5_3600x_firmwareryzen_3_2200gepyc_7402p_firmwareryzen_7_5800_firmwareepyc_7402epyc_7643epyc_7232p_firmwareepyc_7261ryzen_5_2500uryzen_3_3300uryzen_threadripper_3970xryzen_7_5800x3dryzen_9_5900_firmwareryzen_threadripper_pro_3955wxamd_3015ce_firmwareepyc_7702epyc_7h12_firmwareepyc_7452_firmwareryzen_threadripper_pro_5945wxepyc_7401pepyc_7543p_firmwareryzen_9_3900x_firmwareepyc_7272epyc_7513_firmwareryzen_5_3500xryzen_3_3300x_firmwareryzen_threadripper_pro_3945wxryzen_threadripper_3960x_firmwareryzen_3_3100epyc_7443pryzen_7_3700cryzen_7_3780uepyc_7f72_firmwareepyc_7301ryzen_3_3300u_firmwareryzen_5_3600xtepyc_7401epyc_7f52epyc_7f32epyc_7261_firmwareepyc_7402_firmwareepyc_7351_firmwareryzen_7_5700xepyc_75f3_firmwareryzen_5_3450u_firmwareamd_3015eryzen_5_3600_firmwareepyc_7443_firmwareepyc_7763_firmwareepyc_7401p_firmwareepyc_7252_firmwareryzen_5_2600hepyc_7643_firmwareepyc_7473x_firmwareepyc_7232pepyc_7532_firmwareepyc_7453_firmwareepyc_7351p_firmwareepyc_7551pryzen_3_3350uryzen_9_3900ryzen_5_5500_firmwareepyc_7543pryzen_9_3950x_firmwareryzen_3_2200u_firmwareryzen_9_5900ryzen_threadripper_pro_3955wx_firmwareryzen_3_3200u_firmwareryzen_5_3500x_firmwareryzen_threadripper_pro_3975wxryzen_threadripper_pro_3975wx_firmwareepyc_7551p_firmwareepyc_7663_firmwareepyc_7352_firmwareamd_3015e_firmwareryzen_7_2800h_firmwareryzen_threadripper_pro_3995wxryzen_7_5800epyc_7713_firmwareepyc_7371_firmwareepyc_7713epyc_7281_firmwareryzen_7_3750h_firmwareryzen_7_3800xepyc_7313pryzen_threadripper_pro_5975wxepyc_7773x_firmwareepyc_7573xepyc_7502pryzen_5_2400gepyc_7282ryzen_9_5900xryzen_5_3500u_firmwareryzen_5_5500epyc_7443p_firmwareepyc_7343_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3250cryzen_3_3200uepyc_7601epyc_7002_firmwareryzen_7_5800x_firmwareryzen_threadripper_pro_5955wx_firmwareRyzen™ 3000 Series Desktop Processors “Matisse” AM4Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”Ryzen™ Threadripper™ PRO Processors “Castle Peak” WSRyzen™ 2000 Series Mobile Processors “Raven Ridge” FP51st Gen AMD EPYC™ Processors2nd Gen AMD EPYC™ ProcessorsAthlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULP3rd Gen AMD EPYC™ ProcessorsRyzen™ 2000 series Desktop Processors “Raven Ridge” AM4Ryzen™ Threadripper™ PRO Processors “Chagall” WSAMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM43rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDTRyzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso”
CVE-2021-26361
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 32.39%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 17:46
Updated-17 Sep, 2024 | 01:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-athlon_3150geryzen_5_5600hathlon_3150g_firmwareryzen_3_5425cryzen_3_5425u_firmwareathlon_3050geryzen_5_5600uryzen_5_2500uryzen_9_5980hxryzen_3_2300u_firmwareryzen_7_5800hsryzen_5_5600xryzen_9_5900hx_firmwareryzen_5_5600hsryzen_3_2300uryzen_7_5825uryzen_5_2600xryzen_7_2700u_firmwareryzen_5_5625uryzen_5_5700geryzen_7_5825u_firmwareryzen_3_5125cryzen_7_2800h_firmwareryzen_5_5700gryzen_9_5900hs_firmwareryzen_5_5560uryzen_5_5600u_firmwareryzen_5_2500u_firmwareryzen_3_2200u_firmwareryzen_9_5900hsryzen_3_2200uryzen_7_2700xryzen_5_5700g_firmwareryzen_9_5980hsryzen_3_5125c_firmwareryzen_7_5800u_firmwareryzen_7_5825c_firmwareryzen_5_2600ryzen_7_2700ryzen_7_2700x_firmwareryzen_7_5800h_firmwareryzen_5_5625c_firmwareryzen_3_5425uryzen_5_2600hryzen_5_5625cryzen_5_5700ge_firmwareryzen_5_5560u_firmwareryzen_9_5980hx_firmwareryzen_7_2700uryzen_3_5400uradeon_softwareryzen_7_5825cryzen_5_2600h_firmwareryzen_7_5800uryzen_7_2800hathlon_3150gryzen_9_5900hxryzen_5_2600x_firmwareryzen_5_5600x_firmwareryzen_9_5980hs_firmwareryzen_5_5600hs_firmwareryzen_3_5425c_firmwareryzen_7_2700_firmwareathlon_3150ge_firmwareryzen_5_5600h_firmwareryzen_7_5800hryzen_3_5400u_firmwareryzen_5_2600_firmwareryzen_7_5800hs_firmwareryzen_5_5625u_firmwareathlon_3050ge_firmwareAthlon™ SeriesRyzen™ Series
CVE-2021-26343
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 33.63%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-09 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7313pepyc_7543epyc_7573xepyc_7663_firmwareepyc_7543p_firmwareepyc_7313_firmwareepyc_7313epyc_7413_firmwareepyc_7543pepyc_7643epyc_74f3epyc_7543_firmwareepyc_7443epyc_75f3epyc_7453epyc_7513epyc_7763_firmwareepyc_7343epyc_7773x_firmwareepyc_73f3_firmwareepyc_7713p_firmwareepyc_7713pepyc_7373xepyc_7443pepyc_7453_firmwareepyc_7773xepyc_7513_firmwareepyc_7713_firmwareepyc_72f3_firmwareepyc_7743epyc_7573x_firmwareepyc_7443p_firmwareepyc_73f3epyc_7763epyc_7313p_firmwareepyc_7743_firmwareepyc_7373x_firmwareepyc_7643_firmwareepyc_72f3epyc_74f3_firmwareepyc_75f3_firmwareepyc_7003_firmwareepyc_7713epyc_7343_firmwareepyc_7003epyc_7443_firmwareepyc_7413epyc_76633rd Gen EPYC
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-26337
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 32.39%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 18:24
Updated-17 Sep, 2024 | 03:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareryzen_5800x_firmwareepyc_7282_firmwareepyc_7f32epyc_7272_firmwareepyc_7713pryzen_3_3100_firmwareepyc_7443epyc_7513ryzen_threadripper_2950x_firmwareryzen_5600gryzen_9_3900xryzen_pro_3200g_firmwareepyc_7232p_firmwareryzen_9_5980hxepyc_7702ryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwareryzen_5_5600xryzen_pro_3400g_firmwareryzen_pro_3700_firmwareryzen_threadripper_pro_5995wxepyc_7453ryzen_5_5600hsryzen_pro_5750geryzen_7_5825uepyc_7513_firmwareryzen_7_5825u_firmwareryzen_pro_5650geryzen_5_3600x_firmwareepyc_7542ryzen_5_3400gepyc_7413_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_3960xryzen_threadripper_2950xryzen_threadripper_pro_3975wxepyc_7002epyc_7643_firmwareryzen_5900xepyc_7f52ryzen_5300ge_firmwareepyc_75f3ryzen_threadripper_pro_5945wxryzen_pro_5650g_firmwareryzen_5700gepyc_7f32_firmwareryzen_3_3100epyc_7502epyc_75f3_firmwareepyc_7662_firmwareepyc_7f72_firmwareepyc_7343_firmwareryzen_9_5900hsryzen_5300g_firmwareryzen_pro_3200geepyc_7313pepyc_7002_firmwareryzen_threadripper_2920xryzen_9_5980hsryzen_7_5800h_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_pro_5750g_firmwareryzen_7_3700xryzen_3_3300xryzen_5950x_firmwareepyc_7352ryzen_pro_5350gepyc_7713_firmwareepyc_7742epyc_7272ryzen_5_3450g_firmwareryzen_3_5400uepyc_7713epyc_7003_firmwareepyc_7443p_firmwareryzen_pro_3900_firmwareryzen_threadripper_3990x_firmwareryzen_pro_3200gepyc_7003ryzen_pro_3700ryzen_5_5600x_firmwareryzen_5700g_firmwareryzen_9_5980hs_firmwareryzen_7_3700x_firmwareryzen_5900x_firmwareryzen_5300gryzen_5700geryzen_threadripper_3990xryzen_5_5600hs_firmwareryzen_5_3400g_firmwareryzen_5800x3d_firmwareryzen_5_5600h_firmwareryzen_threadripper_pro_5955wxryzen_3_5400u_firmwareepyc_7742_firmwareryzen_7_3800xryzen_pro_5350g_firmwareryzen_5_3600_firmwareryzen_pro_5650ge_firmwareryzen_threadripper_2990wx_firmwareepyc_7443_firmwareryzen_5_5600hepyc_7402pepyc_7343ryzen_5600x_firmwareepyc_7252_firmwareepyc_7543_firmwareryzen_3_3300x_firmwareepyc_7542_firmwareepyc_7763_firmwareryzen_threadripper_pro_5945wx_firmwareryzen_3_5425u_firmwareryzen_3_3300g_firmwareepyc_7313p_firmwareryzen_5_3450gepyc_7252epyc_7502pryzen_5600geryzen_5_5600uryzen_threadripper_pro_5975wxepyc_7302p_firmwareryzen_9_5900hx_firmwareryzen_pro_3900epyc_7642_firmwareryzen_threadripper_2970wxryzen_5600ge_firmwareepyc_7452epyc_7543p_firmwareryzen_5_5625uryzen_threadripper_2920x_firmwareryzen_5600g_firmwareryzen_pro_3600_firmwareepyc_7302ryzen_7_3800x_firmwareryzen_pro_5750ge_firmwareryzen_pro_3400ge_firmwareepyc_7232pryzen_threadripper_pro_3945wx_firmwareryzen_9_5900hs_firmwareepyc_7663ryzen_5_5600u_firmwareepyc_7552_firmwareryzen_5_3600xepyc_72f3_firmwareryzen_pro_3350gepyc_7f72epyc_7662epyc_7642ryzen_threadripper_2970wx_firmwareryzen_threadripper_pro_5975wx_firmwareryzen_5800xryzen_9_3950x_firmwareryzen_5700ge_firmwareepyc_7532_firmwareryzen_pro_5350ge_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareepyc_7413ryzen_pro_3200ge_firmwareryzen_pro_5350geepyc_7313ryzen_pro_3350g_firmwareepyc_7663_firmwareryzen_threadripper_pro_3955wxryzen_7_5800u_firmwareryzen_9_3900x_firmwareepyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareryzen_3_5425uepyc_7763epyc_7302_firmwareryzen_threadripper_pro_3955wx_firmwareryzen_5600xryzen_5300geepyc_7402_firmwareryzen_9_5980hx_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7702pryzen_threadripper_pro_3995wx_firmwareepyc_7f52_firmwareepyc_7262ryzen_5950xryzen_threadripper_pro_5965wxryzen_7_5800uryzen_pro_5650gryzen_9_5900hxepyc_72f3epyc_7643ryzen_5800x3dryzen_pro_3400geepyc_7402p_firmwareepyc_7452_firmwareryzen_threadripper_2990wxryzen_threadripper_3970xryzen_9_3950xryzen_pro_3600ryzen_3_3300gryzen_7_5800hepyc_7313_firmwareepyc_7543pryzen_pro_3400gepyc_7443pryzen_threadripper_3970x_firmwareryzen_5_3600ryzen_threadripper_pro_3945wxepyc_7453_firmwareryzen_threadripper_pro_3975wx_firmwareepyc_7282ryzen_7_5800hs_firmwareryzen_pro_5750gryzen_threadripper_pro_5995wx_firmwareepyc_7702_firmwareepyc_74f3epyc_7352_firmwareepyc_7532ryzen_5_5625u_firmwareepyc_73f3Athlon™ SeriesRyzen™ Series
CVE-2021-26313
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 22.98%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 11:23
Updated-16 Sep, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AMD Speculative Code Store Bypass

Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Intel CorporationDebian GNU/LinuxBroadcom Inc.Arm Limited
Product-debian_linuxcore_i7-7700kryzen_5_5600xxeon_silver_4214core_i7-10700kryzen_threadripper_2990wxcortex-a72xenryzen_7_2700xcore_i9-9900kbcm2711All supported processors
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-26312
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 33.23%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 17:55
Updated-16 Sep, 2024 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7371_firmwareepyc_7443_firmwareepyc_7402pepyc_7451epyc_7261epyc_7282_firmwareepyc_7343epyc_7252_firmwareepyc_7543_firmwareepyc_7f32epyc_7542_firmwareepyc_7551_firmwareepyc_7763_firmwareepyc_7272_firmwareepyc_7713pepyc_7443epyc_7513epyc_7313p_firmwareepyc_7252epyc_7502pepyc_7232p_firmwareepyc_7702epyc_7351p_firmwareepyc_7302p_firmwareepyc_7453epyc_7642_firmwareepyc_7h12epyc_7452epyc_7513_firmwareepyc_7543p_firmwareepyc_7542epyc_7281_firmwareepyc_7413_firmwareepyc_7h12_firmwareepyc_7601epyc_7302epyc_7232pepyc_7643_firmwareepyc_7f52epyc_7663epyc_7552_firmwareepyc_75f3epyc_7371epyc_72f3_firmwareepyc_7f72epyc_7f32_firmwareepyc_7662epyc_7f72_firmwareepyc_7662_firmwareepyc_7502epyc_75f3_firmwareepyc_7642epyc_7451_firmwareepyc_7343_firmwareepyc_7532_firmwareepyc_7551epyc_7281epyc_7502p_firmwareepyc_7413epyc_7301epyc_7551pepyc_7313pepyc_7313epyc_7351pepyc_7551p_firmwareepyc_7663_firmwareepyc_7601_firmwareepyc_7351_firmwareepyc_7251epyc_7532epyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareepyc_7352epyc_7302_firmwareepyc_7763epyc_7401epyc_7713_firmwareepyc_7402_firmwareepyc_7742epyc_7713p_firmwareepyc_7272epyc_73f3_firmwareepyc_7702pepyc_7f52_firmwareepyc_7262epyc_7713epyc_7443p_firmwareepyc_7251_firmwareepyc_7401_firmwareepyc_72f3epyc_7643epyc_7452_firmwareepyc_7402p_firmwareepyc_7351epyc_7261_firmwareepyc_7543pepyc_7313_firmwareepyc_7443pepyc_7742_firmwareepyc_7453_firmwareepyc_7282epyc_7501epyc_7501_firmwareepyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7301_firmwareepyc_73f3Athlon™ SeriesRyzen™ SeriesEPYC™ Processors
CWE ID-CWE-665
Improper Initialization
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-26314
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 26.68%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 11:23
Updated-17 Sep, 2024 | 02:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AMD Speculative execution with Floating-Point Value Injection

Potential floating point value injection in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution with incorrect floating point results, may cause the use of incorrect data from FPVI and may result in data leakage.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Intel CorporationFedora ProjectBroadcom Inc.Arm Limited
Product-core_i7-7700kryzen_5_5600xxeon_silver_4214fedoracore_i7-10700kryzen_threadripper_2990wxcortex-a72xenryzen_7_2700xcore_i9-9900kbcm2711All supported processors
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-20588
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-6.11% / 90.57%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:06
Updated-17 Oct, 2024 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Speculative Leaks

A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 

Action-Not Available
Vendor-Debian GNU/LinuxMicrosoft CorporationXen ProjectFedora ProjectAdvanced Micro Devices, Inc.
Product-windows_server_2022_23h2athlon_gold_pro_3150ge_firmwareryzen_3_pro_3200ge_firmwareepyc_7371_firmwareepyc_7261epyc_7451ryzen_5_pro_3400g_firmwareryzen_3_3200gewindows_11_21h2epyc_7551_firmwareryzen_5_pro_3350ge_firmwareathlon_silver_pro_3125ge_firmwarewindows_10_21h2epyc_7351p_firmwareathlon_pro_300gefedoraathlon_gold_pro_3150gwindows_10_22h2epyc_7571_firmwareryzen_5_pro_3400gepyc_7401pryzen_5_3400gepyc_7281_firmwareathlon_silver_pro_3125geepyc_7601ryzen_5_pro_3350geryzen_3_pro_3200geryzen_3_pro_3200g_firmwareepyc_7371athlon_pro_300ge_firmwareryzen_3_3200g_firmwareryzen_3_pro_3200gathlon_silver_3050gedebian_linuxepyc_7451_firmwareryzen_3_3200gepyc_7281epyc_7551windows_11_22h2epyc_7301epyc_7551pwindows_server_2008epyc_7401p_firmwareathlon_gold_3150gwindows_server_2016athlon_silver_3050ge_firmwarewindows_server_2012epyc_7351pepyc_7551p_firmwarewindows_10_1507ryzen_5_pro_3350g_firmwareepyc_7601_firmwareepyc_7351_firmwareepyc_7251epyc_7401epyc_7571athlon_gold_pro_3150gexenwindows_10_1607athlon_gold_pro_3150g_firmwareathlon_gold_3150geepyc_7251_firmwareepyc_7401_firmwareryzen_5_pro_3400geryzen_5_pro_3350gryzen_3_3200ge_firmwareryzen_5_3400g_firmwareepyc_7351epyc_7261_firmwarewindows_11_23h2windows_10_1809ryzen_5_pro_3400ge_firmwareathlon_gold_3150ge_firmwareepyc_7501epyc_7501_firmwareathlon_gold_3150g_firmwareepyc_7301_firmwarewindows_server_2019Athlon™ PRO 3000 Series Processors with Radeon™ Vega Graphics EPYC™ 7001 ProcessorsRyzen™ PRO 3000 Series Processors with Radeon™ Vega GraphicsAthlon™ 3000 Series Processors with Radeon™ Graphics Ryzen™ 3000 Series Processors with Radeon™ Graphics
CWE ID-CWE-369
Divide By Zero
CVE-2023-20593
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-6.32% / 90.75%
||
7 Day CHG~0.00%
Published-24 Jul, 2023 | 19:38
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Debian GNU/Linux
Product-epyc_7302pryzen_9_3950xryzen_3_pro_4350g_firmwareryzen_3_5300uepyc_7742_firmwareepyc_7702pepyc_7552_firmwareepyc_7f32_firmwareepyc_7f52_firmwareepyc_7272_firmwareepyc_7302p_firmwareryzen_7_5700u_firmwareepyc_7232p_firmwareryzen_threadripper_3960xepyc_7402epyc_7662epyc_7662_firmwareryzen_5_5500uryzen_9_3900xepyc_7452ryzen_threadripper_3990x_firmwareepyc_7542epyc_7f72ryzen_3_4300g_firmwareryzen_7_pro_4750geryzen_threadripper_pro_3975wx_firmwareathlon_gold_7220uryzen_3_pro_4350ge_firmwareepyc_7262_firmwareepyc_7f72_firmwareepyc_7f52ryzen_9_3900_firmwareryzen_3_pro_4200g_firmwareryzen_7_3800xryzen_7_4700gryzen_3_4300gepyc_7402p_firmwareryzen_7_4700g_firmwareepyc_7282_firmwareepyc_7282ryzen_7_3800x_firmwareryzen_9_3950x_firmwareryzen_3_3300x_firmwareryzen_5_3500_firmwareepyc_7702ryzen_5_pro_4650gepyc_7272epyc_7532_firmwareryzen_7_3700x_firmwareepyc_7352_firmwareryzen_threadripper_3990xepyc_7302epyc_7352ryzen_7_4700geepyc_7232pathlon_gold_7220u_firmwareryzen_7_5700uryzen_threadripper_3970x_firmwareryzen_5_pro_4650g_firmwareepyc_7252ryzen_3_pro_4450u_firmwareepyc_7552ryzen_9_pro_3900_firmwareryzen_5_3600xt_firmwareryzen_3_3100_firmwareryzen_5_7520u_firmwareryzen_7_3800xtepyc_7542_firmwareryzen_3_4300ge_firmwareryzen_3_pro_4200gepyc_7h12epyc_7502ryzen_3_3300xepyc_7452_firmwareryzen_5_3600x_firmwareryzen_5_3500ryzen_threadripper_pro_3955wxryzen_threadripper_pro_3995wxxenryzen_7_pro_4750g_firmwareryzen_7_pro_4750ge_firmwareepyc_7642ryzen_3_7320uepyc_7702p_firmwareepyc_7502pryzen_5_pro_4400g_firmwareryzen_threadripper_pro_3945wx_firmwareepyc_7502p_firmwareryzen_9_pro_3900ryzen_7_3700xepyc_7252_firmwareryzen_5_pro_4650ge_firmwareryzen_threadripper_3960x_firmwareryzen_5_3600xtryzen_5_3600xryzen_3_7320u_firmwareryzen_3_4300geryzen_9_3900xt_firmwareryzen_5_7520uepyc_7302_firmwareepyc_7502_firmwareryzen_7_3800xt_firmwareryzen_5_3500xryzen_5_4600ge_firmwareryzen_7_pro_4750gepyc_7f32ryzen_5_pro_4650geepyc_7402pryzen_threadripper_pro_3945wxepyc_7642_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_3_pro_4350gryzen_threadripper_pro_3975wxryzen_3_pro_4450uryzen_9_3900x_firmwareepyc_7532ryzen_7_pro_4750u_firmwareryzen_threadripper_pro_3955wx_firmwareepyc_7742ryzen_5_3600_firmwareryzen_9_3900xtryzen_5_3500x_firmwareryzen_7_4700ge_firmwareryzen_5_4600geryzen_5_4600g_firmwareryzen_3_5300u_firmwareryzen_5_3600ryzen_threadripper_3970xryzen_3_3100ryzen_7_pro_4750uepyc_7702_firmwareryzen_5_4600gepyc_7402_firmwareryzen_9_3900ryzen_5_5500u_firmwaredebian_linuxryzen_5_pro_4400gepyc_7h12_firmwareryzen_3_pro_4350geepyc_72622nd Gen AMD EPYC™ ProcessorsRyzen™ 5000 Series Mobile processors with Radeon™ Graphics “Lucienne”Ryzen™ 3000 Series Desktop Processors “Matisse” AM4Ryzen™ 4000 Series Mobile processors with Radeon™ Graphics “Renoir”Ryzen™ 7020 Series processors “Mendocino” FT6Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP33rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDTAMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2023-20597
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.89%
||
7 Day CHG~0.00%
Published-20 Sep, 2023 | 17:32
Updated-27 Jun, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_6600hryzen_3_3500uryzen_threadripper_3970xryzen_3800x_firmwareryzen_3_3250c_firmwareryzen_5_5600ge_firmwareryzen_3600xryzen_4300geryzen_3900xt_firmwareryzen_3_3200gryzen_5_5700ge_firmwareryzen_3_3350uryzen_threadripper_pro_3945wxryzen_4700g_firmwareryzen_5600gryzen_4300ge_firmwareryzen_5_5560uryzen_3_3550h_firmwareryzen_5_5500u_firmwareryzen_3_3300ryzen_5995wxryzen_3_3100_firmwareryzen_3100ryzen_5_5600hs_firmwareryzen_3995wxryzen_3800xryzen_3_3580uryzen_5600ryzen_6800h_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_3100_firmwareryzen_5500_firmwareryzen_3800xtryzen_5700geryzen_3_3300g_firmwareryzen_3_3500u_firmwareryzen_3970x_firmwareryzen_4700gryzen_threadripper_3990xryzen_5_5700gryzen_4600gryzen_3_3350u_firmwareryzen_3955wxryzen_5_5700g_firmwareryzen_3975wx_firmwareryzen_3_3300_firmwareryzen_3500xryzen_3_3250uryzen_5800x3d_firmwareryzen_3900xtryzen_5700xryzen_5950x_firmwareryzen_3_3200g_firmwareryzen_3900ryzen_5_5625c_firmwareryzen_3_3300u_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_6800hsryzen_3_3750hryzen_5700x_firmwareryzen_5955wxryzen_3600_firmwareryzen_5995wx_firmwareryzen_5600ge_firmwareryzen_5900xryzen_4600geryzen_5_5600hryzen_3_3700cryzen_3_3700uryzen_3500ryzen_5500ryzen_5900x_firmwareryzen_6900hsryzen_3_3200ge_firmwareryzen_3990x_firmwareryzen_6600uryzen_6980hxryzen_4300gryzen_3300xryzen_5975wx_firmwareryzen_3995wx_firmwareryzen_3300x_firmwareryzen_5900ryzen_5_5600uryzen_3975wxryzen_5700g_firmwareryzen_5_5600_firmwareryzen_5800_firmwareryzen_3600ryzen_5_5600g_firmwareryzen_3945wx_firmwareryzen_5700gryzen_3_3550hryzen_5950xryzen_5965wxryzen_5_5600geryzen_3950x_firmwareryzen_5_5625uryzen_5300gryzen_threadripper_3970x_firmwareryzen_5300g_firmwareryzen_5_5600x_firmwareryzen_6600u_firmwareryzen_5600_firmwareryzen_6900hx_firmwareryzen_6800hryzen_6600hsryzen_5300geryzen_5_5600xryzen_3900xryzen_3_3300uryzen_3945wxryzen_3970xryzen_threadripper_pro_3975wx_firmwareryzen_3600xtryzen_5_5600h_firmwareryzen_3_3500cryzen_5800x3dryzen_3_3200geryzen_5800x_firmwareryzen_threadripper_pro_3795wxryzen_3_3200u_firmwareryzen_3_3250u_firmwareryzen_3_3500c_firmwareryzen_5_5560u_firmwareryzen_threadripper_pro_3795wx_firmwareryzen_3_3250cryzen_5600g_firmwareryzen_6600h_firmwareryzen_5_5600x3dryzen_3955wx_firmwareryzen_threadripper_3960x_firmwareryzen_6900hxryzen_4700ge_firmwareryzen_3_3780u_firmwareryzen_3_3700c_firmwareryzen_5600geryzen_4600ge_firmwareryzen_5600x_firmwareryzen_5900_firmwareryzen_5_5500_firmwareryzen_5_5600hsryzen_3960xryzen_4300g_firmwareryzen_3_3700u_firmwareryzen_3900x_firmwareryzen_3900_firmwareryzen_3_3200uryzen_6900hs_firmwareryzen_6980hx_firmwareryzen_6800u_firmwareryzen_6980hs_firmwareryzen_threadripper_pro_3975wxryzen_3_3780uryzen_3950xryzen_5_5600u_firmwareryzen_3_3300gryzen_4700geryzen_5955wx_firmwareryzen_5965wx_firmwareryzen_5800xryzen_5_5600gryzen_3600xt_firmwareryzen_3_3580u_firmwareryzen_5600xryzen_threadripper_pro_3995wxryzen_3_3300xryzen_3_3100ryzen_3500_firmwareryzen_3990xryzen_4700sryzen_6980hsryzen_5_5600ryzen_5945wxryzen_5700ge_firmwareryzen_4600g_firmwareryzen_5_5600x3d_firmwareryzen_5945wx_firmwareryzen_6600hs_firmwareryzen_3_3450u_firmwareryzen_threadripper_pro_3955wx_firmwareryzen_3600x_firmwareryzen_threadripper_3990x_firmwareryzen_6800hs_firmwareryzen_5300ge_firmwareryzen_3_3300x_firmwareryzen_3_3750h_firmwareryzen_6800uryzen_5_5500uryzen_3_3450uryzen_threadripper_pro_3955wxryzen_3800xt_firmwareryzen_4700s_firmwareryzen_5_5500ryzen_5_5625cryzen_3960x_firmwareryzen_3500x_firmwareryzen_threadripper_3960xryzen_5975wxryzen_5800ryzen_5_5625u_firmwareryzen_5_5700geRyzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS SP3AMD Ryzen™ Embedded V3000Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics "Rembrandt-R"Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDTRyzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”AMD Ryzen™ Embedded 5000AMD EPYC™ Embedded 7003AMD Ryzen™ Embedded V2000Ryzen™ 6000 Series Mobile Processors with Radeon™ Graphics "Rembrandt"Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics "Barcelo"Ryzen™ 3000 Series Desktop Processors “Matisse”Ryzen™ 5000 Series Desktop Processors “Vermeer”
CWE ID-CWE-665
Improper Initialization
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2020-12897
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.55%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:44
Updated-16 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CVE-2020-12905
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.55%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 19:40
Updated-17 Sep, 2024 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12904
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.67%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:12
Updated-16 Sep, 2024 | 16:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12901
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.55%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 19:20
Updated-17 Sep, 2024 | 03:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-416
Use After Free
CVE-2020-12912
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-1.21% / 78.61%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 19:08
Updated-04 Aug, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.

Action-Not Available
Vendor-n/aAdvanced Micro Devices, Inc.
Product-energy_driver_for_linuxAMD extension to Linux "hwmon" for Zen1 platforms
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-26327
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.55%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 18:18
Updated-17 Sep, 2024 | 02:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7313epyc_7443_firmwareepyc_7343epyc_7663_firmwareepyc_7543_firmwareepyc_7763_firmwareepyc_7713pepyc_7443epyc_74f3_firmwareepyc_7513epyc_7313p_firmwareepyc_7763epyc_7713_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7453epyc_7713epyc_7003_firmwareepyc_7443p_firmwareepyc_7513_firmwareepyc_7543p_firmwareepyc_7003epyc_7413_firmwareepyc_72f3epyc_7643epyc_7643_firmwareepyc_7663epyc_75f3epyc_72f3_firmwareepyc_7313_firmwareepyc_7543pepyc_7443pepyc_75f3_firmwareepyc_7453_firmwareepyc_7343_firmwareepyc_74f3epyc_7413epyc_7313pepyc_73f33rd Gen AMD EPYC™
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-26393
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.17% / 38.65%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 20:44
Updated-16 Sep, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-amd_3020e_firmwareradeon_pro_w5500xryzen_5_3580uradeon_rx_vega_64ryzen_3_pro_3200ge_firmwareathlon_silver_3050u_firmwareathlon_silver_3050e_firmwareryzen_3_3250cradeon_rx_6600amd_3015eradeon_rx_5300ryzen_5_pro_3350ge_firmwareradeon_rx_vega_56ryzen_5_2500uathlon_gold_3150c_firmwareryzen_9_5980hxryzen_7_5800hsryzen_5_5600hsryzen_3_5300geryzen_3_2300uryzen_7_3750h_firmwareradeon_rx_6700sryzen_5_3400gradeon_rx_5700mamd_3020eathlon_pro_3145bryzen_5_5560uryzen_3_2200g_firmwareradeon_rx_5700ryzen_3_pro_3200geryzen_3_pro_3200g_firmwareryzen_5_2500u_firmwareradeon_rx_5700_xtryzen_3_pro_3200gryzen_7_3750hradeon_rx_5500mryzen_7_5700u_firmwareryzen_3_2200u_firmwareathlon_silver_3050eryzen_3_3200gryzen_7_3780uryzen_9_5900hsryzen_3_2200uradeon_rx_6500_xtryzen_3_3250c_firmwareradeon_rx_6950_xtryzen_7_5700gryzen_9_5980hsryzen_5_2400geryzen_7_3700cryzen_5_pro_3350g_firmwareryzen_5_5500u_firmwareryzen_7_5800h_firmwareenterprise_driverradeon_pro_softwareryzen_5_2600hryzen_5_3500uradeon_rx_5600mryzen_7_2700uryzen_3_5400uradeon_softwareathlon_pro_3045bryzen_7_2800hryzen_5_3550hradeon_rx_6700ryzen_7_3780u_firmwareradeon_rx_6400radeon_rx_6800athlon_silver_3050c_firmwareryzen_9_5980hs_firmwareryzen_5_pro_3350gryzen_3_5300gryzen_5_5600ge_firmwareryzen_5_3500c_firmwareryzen_5_3400g_firmwareryzen_5_5600hs_firmwareathlon_gold_3150uryzen_3_3350u_firmwareradeon_pro_w6800xradeon_rx_5600_xtryzen_5_5600h_firmwareryzen_5_5500uryzen_3_5400u_firmwareathlon_silver_3050cryzen_3_3300u_firmwareradeon_rx_6600sryzen_5_2400ge_firmwareryzen_5_2400gradeon_rx_6800sryzen_5_3580u_firmwareryzen_3_2200geryzen_5_3500cryzen_5_5600hryzen_5_pro_3400g_firmwareryzen_3_5300u_firmwareryzen_3_3300uryzen_3_5300uradeon_rx_6900_xtryzen_5_5600gryzen_5_3550h_firmwareryzen_5_5600uradeon_pro_w6400athlon_pro_3045b_firmwareryzen_3_2300u_firmwareradeon_rx_5500radeon_pro_w5700ryzen_9_5900hx_firmwareryzen_5_5600geradeon_rx_5300_xtryzen_7_3700u_firmwareryzen_3_5300ge_firmwareryzen_7_2700u_firmwareryzen_5_pro_3400gryzen_7_5700geryzen_5_3450uradeon_rx_6850m_xtryzen_3_2200ge_firmwareradeon_rx_6600_xtradeon_rx_6650_xtathlon_pro_3145b_firmwareryzen_7_2800h_firmwareryzen_5_pro_3350geryzen_7_5700uradeon_pro_w6600mradeon_pro_w6600xamd_3015ce_firmwareryzen_9_5900hs_firmwareradeon_pro_w6600ryzen_5_5600u_firmwareryzen_3_3200g_firmwareradeon_rx_6800_xtryzen_7_5700g_firmwareradeon_pro_w6900xradeon_rx_5300mradeon_pro_w6800radeon_rx_6600mradeon_pro_w5700xryzen_7_3700c_firmwareradeon_rx_6750_xtryzen_3_5300g_firmwareradeon_rx_5500_xtryzen_7_5800u_firmwareryzen_7_3700uathlon_silver_3050uryzen_3_2200gradeon_rx_6300mamd_3015ceryzen_5_5560u_firmwareryzen_9_5980hx_firmwareradeon_rx_6800mryzen_5_2600h_firmwareryzen_7_5800uradeon_rx_vega_56_firmwareradeon_rx_vega_64_firmwareryzen_9_5900hxradeon_pro_w6800x_duoradeon_rx_6650mradeon_rx_6650m_xtryzen_5_5600g_firmwareradeon_rx_6700_xtathlon_gold_3150cradeon_rx_6700mryzen_3_3250uryzen_5_2400g_firmwareathlon_gold_3150u_firmwareradeon_pro_w5500ryzen_5_pro_3400geradeon_rx_5600ryzen_7_5800hradeon_pro_w6500mryzen_5_3450u_firmwareamd_3015e_firmwareryzen_3_3250u_firmwareryzen_5_pro_3400ge_firmwareryzen_5_3500u_firmwareryzen_7_5800hs_firmwareradeon_pro_w6300mradeon_rx_6500mryzen_7_5700ge_firmwareryzen_3_3350uAMD Radeon RX 5000 Series & PRO W5000 SeriesAMD Ryzen™ Embedded V2000AMD Ryzen™ Embedded V1000AMD Radeon RX 6000 Series & PRO W6000 SeriesAMD Ryzen™ Embedded R2000AMD Ryzen™ Embedded R1000
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2005-1036
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.04%
||
7 Day CHG~0.00%
Published-10 Apr, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FreeBSD 5.x to 5.4 on AMD64 does not properly initialize the IO permission bitmap used to allow user access to certain hardware, which allows local users to bypass intended access restrictions to cause a denial of service, obtain sensitive information, and possibly gain privileges.

Action-Not Available
Vendor-n/aFreeBSD FoundationAdvanced Micro Devices, Inc.
Product-amd64freebsdn/a
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2017-5926
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 59.08%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern AMD processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.

Action-Not Available
Vendor-allwinnern/aAdvanced Micro Devices, Inc.SamsungIntel CorporationNVIDIA Corporation
Product-e-350celeron_n2840a64phenom_9550_4-corecore_i7-6700kcore_i7-3632qmcore_i7_920athlon_ii_640_x4core_i7-4500uexynos_5800core_i7-2620qmtegra_k1_cd570m-a1xeon_e5-2658_v2atom_c2750fx-8320_8-corefx-8120_8-corefx-8350_8-corecore_i5_m480xeon_e3-1240_v5tegra_k1_cd580m-a1n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5927
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 59.08%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern ARM processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.

Action-Not Available
Vendor-allwinnern/aAdvanced Micro Devices, Inc.SamsungIntel CorporationNVIDIA Corporation
Product-e-350celeron_n2840a64phenom_9550_4-corecore_i7-6700kcore_i7-3632qmcore_i7_920athlon_ii_640_x4core_i7-4500uexynos_5800core_i7-2620qmtegra_k1_cd570m-a1xeon_e5-2658_v2atom_c2750fx-8320_8-corefx-8120_8-corefx-8350_8-corecore_i5_m480xeon_e3-1240_v5tegra_k1_cd580m-a1n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5925
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 59.08%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern Intel processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.

Action-Not Available
Vendor-allwinnern/aAdvanced Micro Devices, Inc.SamsungIntel CorporationNVIDIA Corporation
Product-e-350celeron_n2840a64phenom_9550_4-corecore_i7-6700kcore_i7-3632qmcore_i7_920athlon_ii_640_x4core_i7-4500uexynos_5800core_i7-2620qmtegra_k1_cd570m-a1xeon_e5-2658_v2atom_c2750fx-8320_8-corefx-8120_8-corefx-8350_8-corecore_i5_m480xeon_e3-1240_v5tegra_k1_cd580m-a1n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-24916
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-5.9||MEDIUM
EPSS-0.01% / 0.63%
||
7 Day CHG-0.00%
Published-06 Feb, 2026 | 08:48
Updated-10 Feb, 2026 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Identity authentication bypass vulnerability in the window module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5788
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.5||MEDIUM
EPSS-0.22% / 43.85%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Local Disclosure of Sensitive Information vulnerability in HPE NonStop Software Essentials version T0894 T0894H02 through T0894H02^AAI was found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-nonstop_server_softwarenonstop_serverNonStop Software Essentials
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-22251
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 1.62%
||
7 Day CHG~0.00%
Published-12 Jan, 2026 | 17:55
Updated-27 Jan, 2026 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wlc may leak API keys due to an insecure API key configuration

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

Action-Not Available
Vendor-weblateWeblateOrg
Product-wlcwlc
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2005-4881
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.07% / 22.00%
||
7 Day CHG~0.00%
Published-19 Oct, 2009 | 19:27
Updated-08 Aug, 2024 | 00:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The netlink subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) tc_fill_qdisc, (2) tcf_fill_node, (3) neightbl_fill_info, (4) neightbl_fill_param_info, (5) neigh_fill_info, (6) rtnetlink_fill_ifinfo, (7) rtnetlink_fill_iwinfo, (8) vif_delete, (9) ipmr_destroy_unres, (10) ipmr_cache_alloc_unres, (11) ipmr_cache_resolve, (12) inet6_fill_ifinfo, (13) tca_get_fill, (14) tca_action_flush, (15) tcf_add_notify, (16) tc_dump_action, (17) cbq_dump_police, (18) __nlmsg_put, (19) __rta_fill, (20) __rta_reserve, (21) inet6_fill_prefix, (22) rsvp_dump, and (23) cbq_dump_ovl functions.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-0101
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.36%
||
7 Day CHG~0.00%
Published-14 May, 2020 | 20:08
Updated-04 Aug, 2024 | 05:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In BnCrypto::onTransact of ICrypto.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-144767096

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-909
Missing Initialization of Resource
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2026-20805
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-8.20% / 92.00%
||
7 Day CHG+0.98%
Published-13 Jan, 2026 | 17:56
Updated-13 Feb, 2026 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2026-02-03||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Desktop Window Manager Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_10_21h2windows_10_22h2windows_server_2022_23h2windows_server_2025windows_10_1809windows_server_2022windows_11_24h2windows_10_1607windows_server_2019windows_11_23h2windows_11_25h2windows_server_2012Windows Server 2025Windows 11 Version 23H2Windows Server 2012 (Server Core installation)Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows Server 2012 R2Windows 10 Version 21H2Windows 11 Version 25H2Windows Server 2012Windows Server 2012 R2 (Server Core installation)Windows
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-20862
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.43%
||
7 Day CHG+0.01%
Published-13 Jan, 2026 | 17:56
Updated-13 Feb, 2026 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Management Services Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows Management Services allows an authorized attacker to disclose information locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_22h2windows_server_2022_23h2windows_server_2025windows_10_1809windows_server_2022windows_11_24h2windows_server_2019windows_11_23h2windows_11_25h2Windows Server 2025Windows Server 2022Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows 11 Version 23H2Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows 10 Version 21H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows 10 Version 22H2Windows 11 Version 25H2Windows Server 2019
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-20939
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.43%
||
7 Day CHG+0.01%
Published-13 Jan, 2026 | 17:57
Updated-13 Feb, 2026 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows File Explorer Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-Windows Server 2025Windows 11 Version 23H2Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows 10 Version 21H2Windows 11 Version 25H2
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-20823
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.43%
||
7 Day CHG+0.01%
Published-13 Jan, 2026 | 17:56
Updated-13 Feb, 2026 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows File Explorer Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_10_21h2windows_10_22h2windows_server_2022_23h2windows_server_2025windows_10_1809windows_server_2022windows_11_24h2windows_10_1607windows_server_2019windows_11_23h2windows_11_25h2Windows Server 2025Windows 11 Version 23H2Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows 10 Version 21H2Windows 11 Version 25H2
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-20827
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.43%
||
7 Day CHG+0.01%
Published-13 Jan, 2026 | 17:56
Updated-13 Feb, 2026 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Tablet Windows User Interface (TWINUI) Subsystem allows an authorized attacker to disclose information locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_10_21h2windows_10_22h2windows_server_2022_23h2windows_server_2025windows_10_1809windows_server_2022windows_11_24h2windows_10_1607windows_server_2019windows_11_23h2windows_11_25h2Windows Server 2025Windows 11 Version 23H2Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows 10 Version 21H2Windows 11 Version 25H2
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-20678
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 1.27%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 22:58
Updated-13 Feb, 2026 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An app may be able to access sensitive user data.

Action-Not Available
Vendor-Apple Inc.
Product-ipadosiphone_osiOS and iPadOS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-20932
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.43%
||
7 Day CHG+0.01%
Published-13 Jan, 2026 | 17:56
Updated-13 Feb, 2026 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows File Explorer Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2025windows_server_2019windows_server_2022_23h2windows_11_23h2windows_10_22h2windows_10_1607windows_11_25h2windows_server_2016windows_11_24h2windows_10_1809windows_server_2022windows_10_21h2Windows Server 2025Windows 11 Version 23H2Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows 10 Version 21H2Windows 11 Version 25H2
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-20937
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.43%
||
7 Day CHG+0.01%
Published-13 Jan, 2026 | 17:57
Updated-13 Feb, 2026 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows File Explorer Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-Windows Server 2025Windows 11 Version 23H2Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows Server 2016 (Server Core installation)Windows 10 Version 22H2Windows Server 2019Windows Server 2022Windows 10 Version 1607Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2019 (Server Core installation)Windows Server 2016Windows 10 Version 21H2Windows 11 Version 25H2
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-6283
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 2.53%
||
7 Day CHG~0.00%
Published-06 Mar, 2018 | 16:00
Updated-17 Sep, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Security Engine contains a vulnerability in the RSA function where the keyslot read/write lock permissions are cleared on a chip reset which may lead to information disclosure. This issue is rated as high.

Action-Not Available
Vendor-Google LLCNVIDIA Corporation
Product-androidshield_tvshield_tv_firmwareSHIELD TV
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-20953
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.40% / 60.30%
||
7 Day CHG~0.00%
Published-26 Oct, 2022 | 14:00
Updated-25 Oct, 2024 | 16:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities

Multiple vulnerabilities in Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an attacker to conduct path traversal attacks, view sensitive data, or write arbitrary files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-roomostelepresence_collaboration_endpointCisco RoomOS Software
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-20734
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 18.09%
||
7 Day CHG~0.00%
Published-04 May, 2022 | 17:05
Updated-06 Nov, 2024 | 16:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Information Disclosure Vulnerability

A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, local attacker to view sensitive information on an affected system. This vulnerability is due to insufficient file system restrictions. An authenticated attacker with netadmin privileges could exploit this vulnerability by accessing the vshell of an affected system. A successful exploit could allow the attacker to read sensitive information on the underlying operating system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_sd-wan_managerCisco SD-WAN vManage
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-0882
Matching Score-4
Assigner-Google LLC
ShareView Details
Matching Score-4
Assigner-Google LLC
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 3.19%
||
7 Day CHG~0.00%
Published-03 May, 2022 | 15:50
Updated-21 Apr, 2025 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Illegal access to Kernel log in Fuchsia

A bug exists where an attacker can read the kernel log through exposed Zircon kernel addresses without the required capability ZX_RSRC_KIND_ROOT. It is recommended to upgrade the Fuchsia kernel to 4.1.1 or greater.

Action-Not Available
Vendor-Google LLC
Product-fuchsiaFuchsia Kernel
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-0854
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 2.46%
||
7 Day CHG+0.01%
Published-23 Mar, 2022 | 19:46
Updated-02 Aug, 2024 | 23:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A memory leak flaw was found in the Linux kernel’s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kernelKernel
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2022-0013
Matching Score-4
Assigner-Palo Alto Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Palo Alto Networks, Inc.
CVSS Score-5||MEDIUM
EPSS-0.05% / 16.43%
||
7 Day CHG~0.00%
Published-12 Jan, 2022 | 17:30
Updated-16 Sep, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cortex XDR Agent: File Information Exposure Vulnerability When Generating Support File

A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.

Action-Not Available
Vendor-Palo Alto Networks, Inc.Microsoft Corporation
Product-cortex_xdr_agentwindowsCortex XDR Agent
CWE ID-CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-0382
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.43%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 00:00
Updated-02 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kernelkernel
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2022-0175
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 32.34%
||
7 Day CHG~0.00%
Published-26 Aug, 2022 | 00:00
Updated-02 Aug, 2024 | 23:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in the VirGL virtual OpenGL renderer (virglrenderer). The virgl did not properly initialize memory when allocating a host-backed memory resource. A malicious guest could use this flaw to mmap from the guest kernel and read this uninitialized memory from the host, possibly leading to information disclosure.

Action-Not Available
Vendor-virglrenderer_projectn/aRed Hat, Inc.
Product-virglrendererenterprise_linuxvirglrenderer
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2016-7091
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.07% / 21.06%
||
7 Day CHG~0.00%
Published-22 Dec, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-enterprise_linuxenterprise_linux_serverenterprise_linux_hpc_nodeenterprise_linux_desktopenterprise_linux_workstationn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-0966
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 3.36%
||
7 Day CHG~0.00%
Published-15 Dec, 2021 | 18:05
Updated-03 Aug, 2024 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In code generated by BuildParcelFields of generate_cpp.cpp, there is a possible way for a crafted parcelable to reveal uninitialized memory of a target process due to uninitialized data. This could lead to local information disclosure across Binder transactions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-198346478

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-909
Missing Initialization of Resource
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 8
  • 9
  • Next
Details not found