Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-46794

Summary
Assigner-AMD
Assigner Org ID-b58fc414-a1e4-4f92-9d70-1add41838648
Published At-09 May, 2023 | 19:01
Updated At-28 Jan, 2025 | 15:25
Rejected At-
Credits

Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:AMD
Assigner Org ID:b58fc414-a1e4-4f92-9d70-1add41838648
Published At:09 May, 2023 | 19:01
Updated At:28 Jan, 2025 | 15:25
Rejected At:
▼CVE Numbering Authority (CNA)

Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.

Affected Products
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 2000 series Desktop Processors “Raven Ridge” AM4
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 3000 Series Desktop Processors “Matisse” AM4
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • Various
Vendor
Advanced Micro Devices, Inc.AMD
Product
3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ Threadripper™ PRO Processors “Chagall” WS
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULP
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 2000 Series Mobile Processors “Raven Ridge” FP5
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso”
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir”
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Vendor
Advanced Micro Devices, Inc.AMD
Product
Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne”
Package Name
AGESA
Platforms
  • x86
Default Status
unaffected
Versions
Affected
  • various
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001
vendor-advisory
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001
vendor-advisory
x_transferred
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001
Resource:
vendor-advisory
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-125CWE-125 Out-of-bounds Read
Type: CWE
CWE ID: CWE-125
Description: CWE-125 Out-of-bounds Read
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@amd.com
Published At:09 May, 2023 | 20:15
Updated At:28 Jan, 2025 | 16:15

Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Advanced Micro Devices, Inc.
amd
>>ryzen_5300g_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5300g>>-
cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5300ge_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5300ge>>-
cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5500_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5500>>-
cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5600_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5600>>-
cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5600g_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5600g>>-
cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5600ge_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5600ge>>-
cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5600x_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5600x>>-
cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5700g_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5700g>>-
cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5700ge_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5700ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5700ge>>-
cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5700x_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5700x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5700x>>-
cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5800_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5800_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5800>>-
cpe:2.3:h:amd:ryzen_5800:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5800x3d_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5800x3d_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5800x3d>>-
cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5800x_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5800x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5800x>>-
cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5900_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5900_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5900>>-
cpe:2.3:h:amd:ryzen_5900:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5900x_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5900x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5900x>>-
cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5945wx_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5945wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5945wx>>-
cpe:2.3:h:amd:ryzen_5945wx:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5950x_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5950x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5950x>>-
cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5955wx_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5955wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5955wx>>-
cpe:2.3:h:amd:ryzen_5955wx:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5965wx_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5965wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5965wx>>-
cpe:2.3:h:amd:ryzen_5965wx:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5975wx_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5975wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5975wx>>-
cpe:2.3:h:amd:ryzen_5975wx:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5995wx_firmware>>cezannepi-fp6_1.0.0.6
cpe:2.3:o:amd:ryzen_5995wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_5995wx>>-
cpe:2.3:h:amd:ryzen_5995wx:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_3100_firmware>>comboam4pi_1.0.0.9
cpe:2.3:o:amd:ryzen_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_3100>>-
cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_3100_firmware>>comboam4v2_pi_1.2.0.5
cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_3100>>-
cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_3100_firmware>>comboam4v2_pi_1.2.0.8
cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_3100>>-
cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_3100_firmware>>picassopi-fp5_1.0.0.e
cpe:2.3:o:amd:ryzen_3100_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>ryzen_3100>>-
cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-125Primarynvd@nist.gov
CWE-125Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-125
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-125
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001psirt@amd.com
Vendor Advisory
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001
Source: psirt@amd.com
Resource:
Vendor Advisory
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

524Records found

CVE-2021-46749
Matching Score-10
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-10
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.16% / 36.96%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 18:59
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_2600xathlon_gold_3150geryzen_3600x_firmwareryzen_3800xryzen_1200_\(af\)_firmwareryzen_3300xryzen_5300geryzen_3600ryzen_5995wxryzen_2920x_firmwareryzen_5600ryzen_5955wxryzen_5800x_firmwareryzen_2700eryzen_2600_firmwareryzen_5500_firmwareryzen_5900ryzen_3600xryzen_2920xryzen_pro_2100ge_firmwareryzen_2970wx_firmwareryzen_3800x_firmwareryzen_3600xt_firmwareryzen_5700xryzen_5600xryzen_2300x_firmwareryzen_5300g_firmwareryzen_5700geryzen_2600e_firmwareryzen_2950xryzen_3900xt_firmwareryzen_2600ryzen_3600_firmwareryzen_2500xryzen_5600x_firmwareryzen_3900xtryzen_5945wx_firmwareryzen_2990wx_firmwareathlon_gold_3150g_firmwareryzen_5800_firmwareryzen_2990wxryzen_3100_firmwareryzen_3500_firmwareryzen_2500x_firmwareryzen_5300gryzen_2200geryzen_2200ge_firmwareryzen_3900ryzen_5975wxryzen_2200gryzen_2950x_firmwareryzen_2600eryzen_2700_firmwareryzen_5800ryzen_3800xt_firmwareryzen_5800xryzen_5800x3d_firmwareryzen_3300x_firmwareathlon_silver_3050geryzen_2970wxathlon_silver_3050ge_firmwareryzen_3800xtryzen_5500ryzen_2700x_firmwareryzen_3900xryzen_2600x_firmwareryzen_5955wx_firmwareryzen_3500ryzen_5300ge_firmwareryzen_2400ge_firmwareryzen_3950xryzen_5995wx_firmwareryzen_5950x_firmwareathlon_gold_3150gryzen_1200_\(af\)ryzen_5700g_firmwareryzen_5900_firmwareryzen_3600xtryzen_5600ge_firmwareryzen_5600gryzen_5950xryzen_2400gryzen_pro_2100geryzen_5600_firmwareryzen_2700xryzen_5965wx_firmwareryzen_5600g_firmwareryzen_2400geryzen_5945wxryzen_5965wxryzen_5700gryzen_5600geryzen_3900_firmwareryzen_2700ryzen_2200g_firmwareryzen_5900xryzen_3950x_firmwareryzen_5700ge_firmwareryzen_3100ryzen_1600_\(af\)ryzen_2300xryzen_1600_\(af\)_firmwareryzen_3500xryzen_3500x_firmwareryzen_2400g_firmwareryzen_5900x_firmwareryzen_5700x_firmwareryzen_5975wx_firmwareryzen_5800x3dryzen_3900x_firmwareryzen_2700e_firmwareathlon_gold_3150ge_firmwareRyzen™ 3000 Series Desktop Processors “Matisse” AM4Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”Ryzen™ 2000 Series Desktop Processors “Pinnacle Ridge”Ryzen™ Threadripper™ PRO Processors “Castle Peak” WSRyzen™ 2000 Series Mobile Processors “Raven Ridge” FP5Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULPRyzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” Ryzen™ Threadripper™ PRO Processors “Chagall” WSRyzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne”AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDTRyzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso”
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-46765
Matching Score-10
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-10
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.11% / 30.84%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 19:01
Updated-27 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in ASP may allow an attacker with a compromised SMM to induce out-of-bounds memory reads within the ASP, potentially leading to a denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_6980hxryzen_5500_firmwareryzen_3800xryzen_3900xryzen_3900ryzen_5600gryzen_3500x_firmwareryzen_5600ryzen_5700xryzen_5800x3d_firmwareryzen_3500_firmwareryzen_3900_firmwareryzen_6980hsryzen_5975wx_firmwareryzen_5965wxryzen_5900x_firmwareryzen_6800u_firmwareryzen_5900xryzen_3500xryzen_5800ryzen_3600ryzen_6800hsryzen_3900xt_firmwareryzen_6600uryzen_5800x_firmwareryzen_3500ryzen_5500ryzen_5600geryzen_6800hs_firmwareryzen_5955wxryzen_5900ryzen_6800uryzen_6900hxryzen_5800_firmwareryzen_3600xryzen_5950xryzen_5600g_firmwareryzen_6900hsryzen_3300xryzen_3950x_firmwareryzen_3800x_firmwareryzen_5955wx_firmwareryzen_3900xtryzen_6800h_firmwareryzen_5600ge_firmwareryzen_5945wx_firmwareryzen_5700geryzen_3600xtryzen_5800xryzen_3600x_firmwareryzen_5995wx_firmwareryzen_3900x_firmwareryzen_6900hs_firmwareryzen_5700gryzen_6900hx_firmwareryzen_6600hryzen_5600xryzen_5700ge_firmwareryzen_5300g_firmwareryzen_5700x_firmwareryzen_5965wx_firmwareryzen_5300ge_firmwareryzen_5600_firmwareryzen_3950xryzen_5300geryzen_5600x_firmwareryzen_6980hx_firmwareryzen_3800xtryzen_6980hs_firmwareryzen_5950x_firmwareryzen_3800xt_firmwareryzen_6600hs_firmwareryzen_6600u_firmwareryzen_5995wxryzen_3100_firmwareryzen_3300x_firmwareryzen_6800hryzen_3600xt_firmwareryzen_5300gryzen_5700g_firmwareryzen_5945wxryzen_3600_firmwareryzen_3100ryzen_5800x3dryzen_6600h_firmwareryzen_5975wxryzen_5900_firmwareryzen_6600hsRyzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4Ryzen™ 6000 Series Mobile Processors "Rembrandt"Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne”Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-20529
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.40%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:57
Updated-07 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7702_firmwareepyc_7343_firmwareepyc_7453epyc_7702p_firmwareepyc_7413_firmwareepyc_7f52epyc_7302epyc_7232p_firmwareepyc_7302_firmwareepyc_7443epyc_7542epyc_7763_firmwareepyc_7513epyc_7373x_firmwareepyc_7352epyc_7573x_firmwareepyc_7f32epyc_7302p_firmwareepyc_7742epyc_7252epyc_7542_firmwareepyc_7262epyc_7773x_firmwareepyc_72f3_firmwareepyc_7443p_firmwareepyc_7402epyc_7702pepyc_7443pepyc_7h12_firmwareepyc_75f3epyc_7443_firmwareepyc_7642_firmwareepyc_7f32_firmwareepyc_7552_firmwareepyc_7313pepyc_7402pepyc_7543pepyc_7f72_firmwareepyc_7642epyc_7532epyc_7502p_firmwareepyc_7573xepyc_7272_firmwareepyc_7663_firmwareepyc_7763epyc_7413epyc_7643epyc_7502epyc_7h12epyc_7f72epyc_7743_firmwareepyc_7643_firmwareepyc_72f3epyc_7262_firmwareepyc_7352_firmwareepyc_74f3_firmwareepyc_7532_firmwareepyc_7502_firmwareepyc_7543_firmwareepyc_7402p_firmwareepyc_7373xepyc_7232pepyc_7282_firmwareepyc_7743epyc_7452epyc_7452_firmwareepyc_7302pepyc_73f3_firmwareepyc_7702epyc_7543p_firmwareepyc_7663epyc_7773xepyc_7543epyc_7f52_firmwareepyc_7313p_firmwareepyc_7662_firmwareepyc_7252_firmwareepyc_7002_firmwareepyc_7313epyc_7003epyc_7003_firmwareepyc_7002epyc_7313_firmwareepyc_7402_firmwareepyc_74f3epyc_75f3_firmwareepyc_7343epyc_7272epyc_7662epyc_7713p_firmwareepyc_7713pepyc_73f3epyc_7713_firmwareepyc_7453_firmwareepyc_7552epyc_7502pepyc_7713epyc_7742_firmwareepyc_7282epyc_7513_firmware3rd Gen EPYC2nd Gen EPYC
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-20533
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.03% / 7.57%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:52
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_9_5900xepyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7282_firmwareepyc_7f32epyc_7272_firmwareepyc_7713pepyc_7573xepyc_7443epyc_7643pepyc_7513ryzen_9_3900xryzen_3_3100_firmwareryzen_9_5900x_firmwareepyc_7232p_firmwareepyc_7702epyc_7203_firmwareryzen_5_5600xryzen_9_5900_firmwareepyc_7453ryzen_5_3600xt_firmwareepyc_7373xepyc_7513_firmwareryzen_5_3600x_firmwareepyc_7542epyc_7303p_firmwareepyc_7413_firmwareepyc_7h12_firmwareryzen_threadripper_3960x_firmwareryzen_7_5800x3d_firmwareryzen_threadripper_3960xryzen_threadripper_pro_3975wxepyc_7643_firmwareepyc_7f52epyc_75f3epyc_7373x_firmwareepyc_7f32_firmwareryzen_3_3100epyc_7502epyc_7662_firmwareepyc_7f72_firmwareepyc_75f3_firmwareepyc_7473x_firmwareepyc_7343_firmwareepyc_7643p_firmwareepyc_7313pryzen_7_3800xt_firmwareepyc_7573x_firmwareryzen_3_3300xryzen_7_3700xepyc_7352epyc_7303pepyc_7713_firmwareepyc_7742ryzen_5_5500epyc_7272epyc_7203p_firmwareepyc_7713epyc_7443p_firmwareryzen_5_5600_firmwareryzen_7_5800xepyc_7773xryzen_threadripper_3990x_firmwareryzen_9_3900ryzen_5_5600x_firmwareryzen_9_3900_firmwareryzen_7_3700x_firmwareryzen_7_5800x3dryzen_9_5900ryzen_threadripper_3990xepyc_7742_firmwareryzen_7_5800ryzen_7_3800xryzen_9_5950xryzen_5_3600_firmwareryzen_5_5500_firmwareepyc_7663pepyc_7443_firmwareryzen_3_3300x_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7543_firmwareryzen_9_3900xt_firmwareepyc_7542_firmwareepyc_7763_firmwareryzen_5_3600xtepyc_7313p_firmwareryzen_5_3500x_firmwareepyc_7252epyc_7502pryzen_9_3900xtepyc_7302p_firmwareepyc_7663p_firmwareryzen_5_3500xryzen_9_5950x_firmwareepyc_7642_firmwareepyc_7452epyc_7h12ryzen_7_5800x_firmwareepyc_7543p_firmwareepyc_7302ryzen_7_3800x_firmwareepyc_7232pryzen_threadripper_pro_3945wx_firmwareepyc_7663epyc_7203epyc_7552_firmwareepyc_7773x_firmwareryzen_5_3600xepyc_72f3_firmwareepyc_7f72epyc_7662ryzen_7_3800xtepyc_7642epyc_7473xryzen_9_3950x_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareepyc_7413epyc_7313ryzen_7_5700x_firmwareepyc_7663_firmwareryzen_threadripper_pro_3955wxryzen_9_3900x_firmwareepyc_7303_firmwareepyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareryzen_5_3500_firmwareepyc_7302_firmwareepyc_7763ryzen_threadripper_pro_3955wx_firmwareryzen_7_5800_firmwareepyc_7402_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7702pryzen_threadripper_pro_3995wx_firmwareepyc_7f52_firmwareepyc_7262epyc_7203pepyc_72f3epyc_7643epyc_7402p_firmwareepyc_7452_firmwareryzen_9_3950xryzen_5_5600ryzen_threadripper_3970xryzen_5_3500epyc_7543pepyc_7313_firmwareepyc_7443pryzen_threadripper_pro_3945wxryzen_5_3600ryzen_threadripper_3970x_firmwareepyc_7453_firmwareryzen_threadripper_pro_3975wx_firmwareepyc_7282epyc_7303epyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7532ryzen_7_5700xepyc_73f3AMD EPYC™ Embedded 7002AMD Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDTAMD Ryzen™ 5000 Series Desktop Processors “Vermeer”AMD EPYC™ Embedded 7003AMD Ryzen™ Embedded 5000AMD EPYC™ Embedded 70033rd Gen AMD EPYC™ ProcessorsAMD Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS2nd Gen AMD EPYC™ ProcessorsAMD Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3AMD EPYC™ Embedded 7002Ryzen™ 3000 series Desktop Processors “Matisse"
CVE-2023-20530
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.27%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:57
Updated-07 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7343_firmwareepyc_7543_firmwareepyc_7373xepyc_7453epyc_7743epyc_7413_firmwareepyc_73f3_firmwareepyc_7443epyc_7513epyc_7763_firmwareepyc_7373x_firmwareepyc_7573x_firmwareepyc_7543p_firmwareepyc_7663epyc_7773xepyc_72f3_firmwareepyc_7443p_firmwareepyc_7543epyc_7773x_firmwareepyc_7443pepyc_75f3epyc_7443_firmwareepyc_7313p_firmwareepyc_7313pepyc_7543pepyc_7003epyc_7313epyc_7003_firmwareepyc_7313_firmwareepyc_74f3epyc_7573xepyc_75f3_firmwareepyc_7663_firmwareepyc_7763epyc_7343epyc_7413epyc_7643epyc_7713p_firmwareepyc_7713pepyc_73f3epyc_7713_firmwareepyc_7453_firmwareepyc_7743_firmwareepyc_7643_firmwareepyc_7713epyc_72f3epyc_74f3_firmwareepyc_7513_firmware3rd Gen EPYC
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20522
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.27%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-07 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in ASP may allow an attacker with a malicious BIOS to potentially cause a denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-milanpiromepimilanpi_firmwareromepi_firmware3rd Gen EPYC2nd Gen EPYC
CWE ID-CWE-20
Improper Input Validation
CVE-2023-20531
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.40%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:57
Updated-07 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7702_firmwareepyc_7343_firmwareepyc_7453epyc_7702p_firmwareepyc_7413_firmwareepyc_7f52epyc_7302epyc_7232p_firmwareepyc_7302_firmwareepyc_7443epyc_7542epyc_7763_firmwareepyc_7513epyc_7373x_firmwareepyc_7352epyc_7573x_firmwareepyc_7f32epyc_7302p_firmwareepyc_7742epyc_7252epyc_7542_firmwareepyc_7262epyc_7773x_firmwareepyc_72f3_firmwareepyc_7443p_firmwareepyc_7402epyc_7702pepyc_7443pepyc_7h12_firmwareepyc_75f3epyc_7443_firmwareepyc_7642_firmwareepyc_7f32_firmwareepyc_7552_firmwareepyc_7313pepyc_7402pepyc_7543pepyc_7f72_firmwareepyc_7642epyc_7532epyc_7502p_firmwareepyc_7573xepyc_7272_firmwareepyc_7663_firmwareepyc_7763epyc_7413epyc_7643epyc_7502epyc_7h12epyc_7f72epyc_7743_firmwareepyc_7643_firmwareepyc_72f3epyc_7262_firmwareepyc_7352_firmwareepyc_74f3_firmwareepyc_7532_firmwareepyc_7502_firmwareepyc_7543_firmwareepyc_7402p_firmwareepyc_7373xepyc_7232pepyc_7282_firmwareepyc_7743epyc_7452epyc_7452_firmwareepyc_7302pepyc_73f3_firmwareepyc_7702epyc_7543p_firmwareepyc_7663epyc_7773xepyc_7543epyc_7f52_firmwareepyc_7313p_firmwareepyc_7662_firmwareepyc_7252_firmwareepyc_7002_firmwareepyc_7313epyc_7003epyc_7003_firmwareepyc_7002epyc_7313_firmwareepyc_7402_firmwareepyc_74f3epyc_75f3_firmwareepyc_7343epyc_7272epyc_7662epyc_7713p_firmwareepyc_7713pepyc_73f3epyc_7713_firmwareepyc_7453_firmwareepyc_7552epyc_7502pepyc_7713epyc_7742_firmwareepyc_7282epyc_7513_firmware3rd Gen EPYC2nd Gen EPYC
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-12988
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.30% / 52.47%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 21:50
Updated-16 Sep, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7371_firmwareepyc_7443_firmwareepyc_7402pepyc_7261epyc_7451epyc_7282_firmwareepyc_7343epyc_7252_firmwareepyc_7543_firmwareepyc_7f32epyc_7542_firmwareepyc_7551_firmwareepyc_7763_firmwareepyc_7272_firmwareepyc_7713pepyc_7443epyc_7513epyc_7313p_firmwareepyc_7252epyc_7502pepyc_7232p_firmwareepyc_7702epyc_7302p_firmwareepyc_7351p_firmwareepyc_7453epyc_7642_firmwareepyc_7452epyc_7h12epyc_7513_firmwareepyc_7543p_firmwareepyc_7542epyc_7401pepyc_7281_firmwareepyc_7413_firmwareepyc_7h12_firmwareepyc_7302epyc_7601epyc_7232pepyc_7002epyc_7643_firmwareepyc_7f52epyc_7663epyc_7552_firmwareepyc_75f3epyc_72f3_firmwareepyc_7371epyc_7001epyc_7f72epyc_7f32_firmwareepyc_7662epyc_7502epyc_7001_firmwareepyc_75f3_firmwareepyc_7662_firmwareepyc_7f72_firmwareepyc_7642epyc_7451_firmwareepyc_7343_firmwareepyc_7532_firmwareepyc_7281epyc_7551epyc_7502p_firmwareepyc_7413epyc_7301epyc_7551pepyc_7313pepyc_7401p_firmwareepyc_7002_firmwareepyc_7313epyc_7351pepyc_7551p_firmwareepyc_7663_firmwareepyc_7601_firmwareepyc_7351_firmwareepyc_7251epyc_7532epyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareepyc_7352epyc_7302_firmwareepyc_7763epyc_7401epyc_7713_firmwareepyc_7402_firmwareepyc_7742epyc_7713p_firmwareepyc_7272epyc_73f3_firmwareepyc_7702pepyc_7f52_firmwareepyc_7262epyc_7713epyc_7003_firmwareepyc_7443p_firmwareepyc_7003epyc_7251_firmwareepyc_7401_firmwareepyc_72f3epyc_7643epyc_7402p_firmwareepyc_7452_firmwareepyc_7351epyc_7261_firmwareepyc_7313_firmwareepyc_7543pepyc_7443pepyc_7742_firmwareepyc_7453_firmwareepyc_7282epyc_7501epyc_7501_firmwareepyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7301_firmwareepyc_73f31st/2nd/3rd Gen AMD EPYC™ Processors
CVE-2021-26406
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.55%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 18:59
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation in parsing Owner's Certificate Authority (OCA) certificates in SEV (AMD Secure Encrypted Virtualization) and SEV-ES user application can lead to a host crash potentially resulting in denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7301_firmwareepyc_7451_firmwareepyc_7552_firmwareepyc_7451epyc_7282_firmwareepyc_7742_firmwareepyc_7371epyc_7f72_firmwareepyc_7532epyc_7702p_firmwareepyc_7551epyc_7h12epyc_7301epyc_7401epyc_7f52epyc_7f32epyc_7402pepyc_7552epyc_7261_firmwareepyc_7571_firmwareepyc_7252epyc_7402_firmwareepyc_7351_firmwareepyc_7642_firmwareepyc_7262_firmwareepyc_7351epyc_7542epyc_7642epyc_7272_firmwareepyc_7501epyc_7302epyc_7f32_firmwareepyc_7401p_firmwareepyc_7252_firmwareepyc_7352epyc_7401_firmwareepyc_7662epyc_7232pepyc_7532_firmwareepyc_7351p_firmwareepyc_7551pepyc_7501_firmwareepyc_7302_firmwareepyc_7702_firmwareepyc_7742epyc_7f52_firmwareepyc_7502epyc_7452epyc_7601_firmwareepyc_7302pepyc_7502_firmwareepyc_7402p_firmwareepyc_7251epyc_7402epyc_7551_firmwareepyc_7232p_firmwareepyc_7302p_firmwareepyc_7261epyc_7551p_firmwareepyc_7352_firmwareepyc_7281epyc_7502p_firmwareepyc_7371_firmwareepyc_7281_firmwareepyc_7571epyc_7702epyc_7702pepyc_7251_firmwareepyc_7351pepyc_7502pepyc_7h12_firmwareepyc_7452_firmwareepyc_7401pepyc_7282epyc_7272epyc_7662_firmwareepyc_7542_firmwareepyc_7f72epyc_7601epyc_7262Ryzen™ 3000 Series Desktop Processors “Matisse” AM4Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”Ryzen™ 2000 Series Desktop Processors “Pinnacle Ridge”Ryzen™ Threadripper™ PRO Processors “Castle Peak” WSRyzen™ 2000 Series Mobile Processors “Raven Ridge” FP52nd Gen AMD Ryzen™ Threadripper™ Processors “Colfax”1st Gen AMD EPYC™ Processors2nd Gen AMD EPYC™ ProcessorsAthlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULPRyzen™ 2000 series Desktop Processors “Raven Ridge” AM4AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM43rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDTRyzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso”
CVE-2021-26338
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.95%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 17:53
Updated-17 Sep, 2024 | 01:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7443_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7543_firmwareepyc_7282_firmwareepyc_7542_firmwareepyc_7f32epyc_7763_firmwareepyc_7272_firmwareepyc_7713pepyc_7443epyc_7513epyc_7313p_firmwareepyc_7252epyc_7502pepyc_7232p_firmwareepyc_7702epyc_7302p_firmwareepyc_7453epyc_7642_firmwareepyc_7h12epyc_7452epyc_7513_firmwareepyc_7543p_firmwareepyc_7542epyc_7302epyc_7413_firmwareepyc_7h12_firmwareepyc_7232pepyc_7643_firmwareepyc_7f52epyc_7663epyc_7552_firmwareepyc_75f3epyc_72f3_firmwareepyc_7f72epyc_7f32_firmwareepyc_7662epyc_7f72_firmwareepyc_7662_firmwareepyc_7502epyc_75f3_firmwareepyc_7642epyc_7343_firmwareepyc_7532_firmwareepyc_7502p_firmwareepyc_7413epyc_7313pepyc_7313epyc_7663_firmwareepyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareepyc_7352epyc_7302_firmwareepyc_7763epyc_7713_firmwareepyc_7402_firmwareepyc_7742epyc_7713p_firmwareepyc_7272epyc_73f3_firmwareepyc_7702pepyc_7f52_firmwareepyc_7262epyc_7713epyc_7443p_firmwareepyc_72f3epyc_7643epyc_7452_firmwareepyc_7402p_firmwareepyc_7543pepyc_7313_firmwareepyc_7443pepyc_7742_firmwareepyc_7453_firmwareepyc_7282epyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7532epyc_73f32nd Gen AMD EPYC™3rd Gen AMD EPYC™
CWE ID-CWE-284
Improper Access Control
CVE-2022-27674
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.08% / 25.31%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 20:45
Updated-01 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation in the IOCTL input/output buffer in AMD μProf may allow an attacker to bypass bounds checks potentially leading to a Windows kernel crash resulting in denial of service.

Action-Not Available
Vendor-FreeBSD FoundationLinux Kernel Organization, IncMicrosoft CorporationAdvanced Micro Devices, Inc.
Product-amd_uprofwindowsfreebsdlinux_kernelAMD μProf
CWE ID-CWE-20
Improper Input Validation
CVE-2023-31320
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-6.64% / 90.82%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:51
Updated-02 Aug, 2024 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-radeon_pro_w5500xradeon_rx_vega_64radeon_pro_w7600radeon_rx_6500mradeon_rx_6600radeon_pro_vega_56_firmwareryzen_3_5300uradeon_rx_6900_xtradeon_rx_7900mryzen_5_5600gradeon_rx_7900_xtradeon_rx_5300ryzen_7_4700geryzen_7_4800hradeon_rx_vega_56radeon_pro_w6400radeon_rx_5500ryzen_5_5500hradeon_rx_7900_greradeon_pro_w5700ryzen_9_4900hryzen_3_5300geryzen_5_5600geradeon_rx_6550mryzen_7_4800hsradeon_rx_5300_xtryzen_3_3015ceryzen_5_pro_3400gradeon_rx_7800_xtradeon_rx_6700sryzen_7_4700gryzen_7_5700geryzen_3_3015eryzen_3_4300gradeon_rx_6600_xtradeon_rx_6850m_xtradeon_rx_6650_xtradeon_pro_vega_56ryzen_5_pro_3350geradeon_rx_5700mradeon_pro_w6600mradeon_pro_w6600xradeon_pro_w6600radeon_rx_5700radeon_rx_5700_xtradeon_rx_6800_xtradeon_pro_w7500radeon_rx_7600mradeon_rx_5500mradeon_pro_w6900xradeon_rx_5300mradeon_rx_6500_xtradeon_pro_w6800radeon_pro_vega_64radeon_rx_6600mradeon_rx_6550sryzen_3_4100ryzen_9_4900hsradeon_pro_w5700xradeon_rx_6950_xtryzen_7_5700gryzen_5_4600hsradeon_rx_5500_xtryzen_5_pro_3200gradeon_pro_w7800radeon_rx_7700sryzen_5_pro_3200geryzen_5_4600gradeon_rx_6300mradeon_rx_7600radeon_rx_6450mradeon_rx_5600mradeon_rx_6800mradeon_softwareryzen_5_4600geradeon_rx_vega_56_firmwareradeon_rx_vega_64_firmwareryzen_5_4500uradeon_rx_6700radeon_pro_w6800x_duoradeon_pro_w6300radeon_rx_6400ryzen_3_4300uradeon_rx_6650mradeon_rx_6650m_xtradeon_rx_6800radeon_rx_6700_xtradeon_rx_6700mryzen_7_4980uryzen_5_pro_3350gryzen_3_5300gryzen_5_pro_3400geradeon_pro_w5500radeon_rx_5600radeon_pro_w6800xradeon_rx_5600_xtryzen_3_4300geryzen_5_4680uryzen_5_5500uradeon_pro_w6500mradeon_rx_7600sradeon_rx_7600m_xtradeon_pro_vega_64_firmwareryzen_7_4700uradeon_rx_6600sradeon_rx_7700_xtryzen_5_4600uradeon_rx_7900_xtxradeon_rx_6800sradeon_pro_w6300mryzen_7_5700uryzen_5_4600hryzen_5_4500Radeon™ PRO W5000/W6000/W7000 Series Graphics CardsRadeon™ RX Vega Series Graphics CardsRadeon™ RX 5000/6000/7000 Series Graphics Cards Radeon™ PRO WX Vega Series Graphics Cards
CWE ID-CWE-20
Improper Input Validation
CVE-2022-23831
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.50%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 20:45
Updated-01 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation of the IOCTL input buffer in AMD μProf may allow an attacker to send an arbitrary buffer leading to a potential Windows kernel crash resulting in denial of service.

Action-Not Available
Vendor-FreeBSD FoundationLinux Kernel Organization, IncMicrosoft CorporationAdvanced Micro Devices, Inc.
Product-amd_uprofwindowsfreebsdlinux_kernelAMD μProf
CWE ID-CWE-20
Improper Input Validation
CVE-2021-46755
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.14%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 19:00
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Failure to unmap certain SysHub mappings in error paths of the ASP (AMD Secure Processor) bootloader may allow an attacker with a malicious bootloader to exhaust the SysHub resources resulting in a potential denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_3600x_firmwareryzen_3300xryzen_3800xryzen_3800xt_firmwareryzen_5800xryzen_5800x3d_firmwareryzen_3300x_firmwareryzen_3600ryzen_3800xtryzen_5500ryzen_3900xryzen_5600ryzen_3500ryzen_3950xryzen_5800x_firmwareryzen_5950x_firmwareryzen_5700g_firmwareryzen_5500_firmwareryzen_3600xtryzen_3600xryzen_5600gryzen_3800x_firmwareryzen_5950xryzen_3600xt_firmwareryzen_5700xryzen_5600xryzen_5600_firmwareryzen_5600g_firmwareryzen_5700gryzen_3900_firmwareryzen_3900xt_firmwareryzen_3600_firmwareryzen_5900xryzen_3950x_firmwareryzen_5600x_firmwareryzen_3900xtryzen_3100ryzen_3500xryzen_3100_firmwareryzen_3500_firmwareryzen_3500x_firmwareryzen_5900x_firmwareryzen_5700x_firmwareryzen_5800x3dryzen_3900x_firmwareryzen_3900Ryzen™ 3000 Series Desktop Processors “Matisse” AM4Ryzen™ Threadripper™ PRO Processors “Castle Peak” WSRyzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” Ryzen™ Threadripper™ PRO Processors “Chagall” WSAMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDTRyzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne”
CVE-2021-46774
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.11%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:52
Updated-11 Oct, 2024 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_9_5900xepyc_7543epyc_7402epyc_9354pepyc_7f32ryzen_9_3950xtepyc_7713pepyc_7443epyc_7513ryzen_9_5900x_firmwareepyc_7203_firmwareepyc_7453epyc_8224pepyc_9334_firmwareepyc_9454p_firmwareepyc_7542epyc_7303p_firmwareepyc_9454epyc_8024pn_firmwareepyc_7281_firmwareepyc_7413_firmwareepyc_9534_firmwareepyc_9754_firmwareryzen_7_5800x3d_firmwareryzen_threadripper_3960x_firmwareryzen_7_3700xtryzen_threadripper_pro_3975wxepyc_8024pnepyc_7643_firmwareepyc_7f52epyc_9274f_firmwareepyc_7373x_firmwareepyc_7f32_firmwareepyc_7001_firmwareepyc_75f3_firmwareepyc_7473x_firmwareepyc_8024pepyc_8434pepyc_7281epyc_9634_firmwareepyc_7643p_firmwareepyc_7551p_firmwareryzen_9_3950xt_firmwareepyc_7601_firmwareepyc_7573x_firmwareepyc_7303pepyc_7401ryzen_5_5500epyc_7713ryzen_5_5600_firmwareryzen_threadripper_3990x_firmwareryzen_5_5600x_firmwareryzen_9_3900_firmwareryzen_7_5800x3depyc_8324pn_firmwareryzen_threadripper_3990xepyc_9634epyc_9554p_firmwareepyc_8324p_firmwareepyc_8024p_firmwareryzen_7_5800epyc_7501ryzen_9_5950xryzen_5_3600_firmwareryzen_5_5500_firmwareepyc_8124p_firmwareepyc_7663pepyc_7443_firmwareryzen_3_3300x_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7543_firmwareepyc_7542_firmwareepyc_9274fepyc_9734epyc_9454pepyc_9734_firmwareepyc_7313p_firmwareryzen_5_3500x_firmwareepyc_7252epyc_7502pepyc_7351p_firmwareepyc_9124epyc_9374f_firmwareepyc_7601ryzen_7_3800x_firmwareepyc_8534pnryzen_threadripper_pro_3945wx_firmwareepyc_7203epyc_72f3_firmwareepyc_8224p_firmwareepyc_9174fepyc_7662epyc_7642epyc_8534pepyc_7502p_firmwareepyc_7413epyc_9654_firmwareepyc_9384xepyc_7313ryzen_7_5700x_firmwareepyc_7663_firmwareryzen_threadripper_pro_3955wxryzen_9_3900x_firmwareepyc_7351_firmwareepyc_7251epyc_7302pepyc_74f3_firmwareepyc_9654pryzen_5_3500_firmwareepyc_7763epyc_9454_firmwareryzen_threadripper_pro_3955wx_firmwareryzen_7_5800_firmwareepyc_9374fepyc_7402_firmwareepyc_7713p_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareepyc_9334epyc_7203pepyc_7251_firmwareepyc_7401_firmwareepyc_7402p_firmwareryzen_5_5600ryzen_threadripper_3970xepyc_7351epyc_8434pnepyc_7543pepyc_8324pnryzen_threadripper_3970x_firmwareepyc_7453_firmwareryzen_threadripper_pro_3975wx_firmwareepyc_9554epyc_7502_firmwareepyc_7262_firmwareepyc_7371_firmwareepyc_9254_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7551_firmwareepyc_7272_firmwareepyc_7573xryzen_3_3100_firmwareepyc_7643pepyc_9684x_firmwareryzen_9_3900xryzen_7_3700xt_firmwareepyc_7232p_firmwareepyc_9534epyc_7702ryzen_5_5600xryzen_9_5900_firmwareryzen_5_3600xt_firmwareepyc_7373xepyc_7513_firmwareepyc_8124pn_firmwareryzen_5_3600x_firmwareepyc_7h12_firmwareepyc_9384x_firmwareryzen_threadripper_3960xepyc_75f3epyc_7001ryzen_3_3100epyc_7502epyc_7662_firmwareepyc_7f72_firmwareepyc_9184x_firmwareepyc_7343_firmwareepyc_9754s_firmwareepyc_7551epyc_8434p_firmwareepyc_9174f_firmwareepyc_7551pepyc_7313pepyc_9124_firmwareryzen_7_3800xt_firmwareryzen_3_3300xepyc_7352epyc_7713_firmwareepyc_8224pnepyc_7742epyc_7272epyc_9254epyc_7203p_firmwareepyc_9474f_firmwareepyc_7443p_firmwareryzen_7_5800xepyc_7773xryzen_9_3900epyc_8124pryzen_9_5900epyc_7261_firmwareepyc_7742_firmwareryzen_threadripper_pro_3795wxryzen_7_3800xepyc_7501_firmwareepyc_7301_firmwareepyc_7763_firmwareepyc_8534p_firmwareryzen_5_3600xtepyc_8124pnepyc_7302p_firmwareepyc_7663p_firmwareepyc_9354ryzen_5_3500xryzen_9_5950x_firmwareepyc_7642_firmwareepyc_7452epyc_7h12ryzen_7_5800x_firmwareepyc_7543p_firmwareepyc_7401pepyc_9554_firmwareepyc_7302epyc_7232pepyc_7663epyc_7552_firmwareepyc_7773x_firmwareryzen_5_3600xepyc_7371epyc_7f72ryzen_7_3800xtepyc_7473xepyc_8534pn_firmwareepyc_7451_firmwareepyc_9754ryzen_9_3950x_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7301epyc_7401p_firmwareepyc_9554pepyc_9654epyc_9684xepyc_7351pepyc_9474fepyc_7303_firmwareepyc_9754sepyc_7552epyc_7702p_firmwareepyc_7302_firmwareepyc_73f3_firmwareepyc_7702pepyc_9654p_firmwareepyc_7262epyc_8434pn_firmwareepyc_8324pepyc_72f3epyc_7643epyc_9354_firmwareepyc_7452_firmwareryzen_9_3950xepyc_9354p_firmwareepyc_9224_firmwareryzen_5_3500epyc_7313_firmwareepyc_8224pn_firmwareepyc_7443pryzen_threadripper_pro_3945wxepyc_9184xryzen_5_3600epyc_7282epyc_9224epyc_7303epyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7532ryzen_7_5700xepyc_73f34th Gen AMD EPYC™ ProcessorsAMD EPYC™ Embedded 3000AMD Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDTAMD Ryzen™ 5000 Series Desktop Processors “Vermeer”AMD Ryzen™ Embedded 5000AMD EPYC™ Embedded 70033rd Gen AMD EPYC™ ProcessorsAMD Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS2nd Gen AMD EPYC™ ProcessorsAMD Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3AMD EPYC™ Embedded 70021st Gen AMD EPYC™ ProcessorsRyzen™ 3000 series Desktop Processors “Matisse"
CVE-2021-46764
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.11% / 30.84%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 18:36
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of DRAM addresses in SMU may allow an attacker to overwrite sensitive memory locations within the ASP potentially resulting in a denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_72f3_firmwareepyc_7443pepyc_7552_firmwareepyc_7282_firmwareepyc_7742_firmwareepyc_7773xepyc_7f72_firmwareepyc_7413epyc_7532epyc_7313p_firmwareepyc_7702p_firmwareepyc_7663epyc_7h12epyc_7453epyc_73f3_firmwareepyc_7f52epyc_7543_firmwareepyc_7f32epyc_7402pepyc_7552epyc_73f3epyc_74f3_firmwareepyc_7252epyc_7402_firmwareepyc_7642_firmwareepyc_75f3_firmwareepyc_7262_firmwareepyc_7343epyc_7542epyc_7642epyc_7443_firmwareepyc_7272_firmwareepyc_7302epyc_7f32_firmwareepyc_7763_firmwareepyc_7573x_firmwareepyc_7252_firmwareepyc_7473x_firmwareepyc_7352epyc_7643_firmwareepyc_7662epyc_7473xepyc_7232pepyc_7532_firmwareepyc_7453_firmwareepyc_7713p_firmwareepyc_7302_firmwareepyc_7702_firmwareepyc_7742epyc_72f3epyc_7f52_firmwareepyc_7543pepyc_7502epyc_7452epyc_7513epyc_7302pepyc_7763epyc_7413_firmwareepyc_74f3epyc_7502_firmwareepyc_7402p_firmwareepyc_7713pepyc_7402epyc_7643epyc_7313epyc_7232p_firmwareepyc_7443epyc_7302p_firmwareepyc_7663_firmwareepyc_7352_firmwareepyc_7543epyc_7502p_firmwareepyc_7713_firmwareepyc_7713epyc_7702epyc_7702pepyc_75f3epyc_7313pepyc_7773x_firmwareepyc_7313_firmwareepyc_7573xepyc_7502pepyc_7h12_firmwareepyc_7452_firmwareepyc_7543p_firmwareepyc_7282epyc_7272epyc_7513_firmwareepyc_7373xepyc_7662_firmwareepyc_7542_firmwareepyc_7f72epyc_7343_firmwareepyc_7443p_firmwareepyc_7373x_firmwareepyc_72623rd Gen AMD EPYC™ 2nd Gen AMD EPYC™
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-20509
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.2||MEDIUM
EPSS-0.03% / 5.95%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 16:52
Updated-04 Nov, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insufficient DRAM address validation in PMFW may allow a privileged attacker to perform a DMA read from an invalid DRAM address to SRAM, potentially resulting in loss of data integrity.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD Radeon™ RX 7000 Series Graphics CardsAMD Radeon™ PRO W6000 Series Graphics CardsAMD Radeon™ PRO W7000 Series Graphics CardsAMD Radeon™ RX 6000 Series Graphics Cards
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-46768
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 9.86%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-09 Apr, 2025 | 14:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in SEV firmware may allow an attacker to perform out-of-bounds memory reads within the ASP boot loader, potentially leading to a denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-milanpi_firmwaremilanpiromepiromepi_firmware3rd Gen EPYC2nd Gen EPYC
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12904
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.66%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:12
Updated-16 Sep, 2024 | 16:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12933
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.24%
||
7 Day CHG~0.00%
Published-13 Oct, 2020 | 21:11
Updated-04 Aug, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the D3DKMTEscape handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTEscape API request can cause an out-of-bounds read in Windows OS kernel memory area. This vulnerability can be triggered from a non-privileged account.

Action-Not Available
Vendor-n/aAdvanced Micro Devices, Inc.
Product-atikmdag.sysAMD Graphics Driver for Windows
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12980
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.39%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 21:49
Updated-17 Sep, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out of bounds write and read vulnerability in the AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwareradeon_pro_softwarewindows_10AMD Radeon Software
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12911
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 13.24%
||
7 Day CHG~0.00%
Published-13 Oct, 2020 | 21:13
Updated-04 Aug, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the D3DKMTCreateAllocation handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTCreateAllocation API request can cause an out-of-bounds read and denial of service (BSOD). This vulnerability can be triggered from a non-privileged account.

Action-Not Available
Vendor-n/aAdvanced Micro Devices, Inc.
Product-atikmdag.sysAMD Graphics Driver for Windows
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-26345
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-1.9||LOW
EPSS-0.03% / 5.84%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:53
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_9254_firmwareepyc_7282_firmwareepyc_9354pepyc_7f32epyc_7272_firmwareepyc_7573xepyc_7713pepyc_7443epyc_7513epyc_7643pepyc_9684x_firmwareepyc_7232p_firmwareepyc_9534epyc_7702epyc_7203_firmwareepyc_7453epyc_7373xepyc_8224pepyc_7513_firmwareepyc_9334_firmwareepyc_8124pn_firmwareepyc_9454p_firmwareepyc_7542epyc_7303p_firmwareepyc_8024pn_firmwareepyc_9454epyc_7413_firmwareepyc_7h12_firmwareepyc_9754_firmwareepyc_9534_firmwareepyc_9384x_firmwareepyc_8024pnepyc_7643_firmwareepyc_7f52epyc_9274f_firmwareepyc_75f3epyc_7373x_firmwareepyc_7f32_firmwareepyc_7f72_firmwareepyc_7662_firmwareepyc_7502epyc_75f3_firmwareepyc_9184x_firmwareepyc_7473x_firmwareepyc_7343_firmwareepyc_8024pepyc_9754s_firmwareepyc_8434pepyc_9634_firmwareepyc_8434p_firmwareepyc_7643p_firmwareepyc_9174f_firmwareepyc_7313pepyc_9124_firmwareepyc_7573x_firmwareepyc_7352epyc_7303pepyc_7713_firmwareepyc_8224pnepyc_7742epyc_7272epyc_9254epyc_7203p_firmwareepyc_7713epyc_9474f_firmwareepyc_7443p_firmwareepyc_7773xepyc_8124pepyc_8324pn_firmwareepyc_9634epyc_9554p_firmwareepyc_8324p_firmwareepyc_7742_firmwareepyc_8024p_firmwareepyc_8124p_firmwareepyc_7663pepyc_7443_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7543_firmwareepyc_7542_firmwareepyc_7763_firmwareepyc_9274fepyc_8534p_firmwareepyc_9734epyc_9454pepyc_9734_firmwareepyc_8124pnepyc_7313p_firmwareepyc_7252epyc_7502pepyc_7302p_firmwareepyc_9124epyc_7663p_firmwareepyc_9354epyc_7642_firmwareepyc_7h12epyc_7452epyc_7543p_firmwareepyc_9374f_firmwareepyc_9554_firmwareepyc_7302epyc_8534pnepyc_7232pepyc_7203epyc_7663epyc_7552_firmwareepyc_7773x_firmwareepyc_72f3_firmwareepyc_8224p_firmwareepyc_7f72epyc_9174fepyc_7662epyc_7642epyc_7473xepyc_8534pn_firmwareepyc_9754epyc_8534pepyc_7532_firmwareepyc_7502p_firmwareepyc_7413epyc_9654_firmwareepyc_9384xepyc_9554pepyc_9654epyc_9684xepyc_7313epyc_7663_firmwareepyc_9474fepyc_7303_firmwareepyc_9754sepyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareepyc_9654pepyc_7302_firmwareepyc_7763epyc_9454_firmwareepyc_9374fepyc_7402_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7702pepyc_9654p_firmwareepyc_7f52_firmwareepyc_7262epyc_9334epyc_7203pepyc_8434pn_firmwareepyc_8324pepyc_72f3epyc_7643epyc_9354_firmwareepyc_7452_firmwareepyc_7402p_firmwareepyc_9354p_firmwareepyc_8434pnepyc_9224_firmwareepyc_7313_firmwareepyc_7543pepyc_8224pn_firmwareepyc_7443pepyc_8324pnepyc_9184xepyc_7453_firmwareepyc_7282epyc_9224epyc_7303epyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7532epyc_9554epyc_73f34th Gen AMD EPYC™ ProcessorsAMD EPYC™ Embedded 70033rd Gen AMD EPYC™ Processors2nd Gen AMD EPYC™ ProcessorsAMD EPYC™ Embedded 7002
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-26388
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 15.31%
||
7 Day CHG~0.00%
Published-11 May, 2022 | 16:29
Updated-16 Sep, 2024 | 23:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper validation of the BIOS directory may allow for searches to read beyond the directory table copy in RAM, exposing out of bounds memory contents, resulting in a potential denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_9_5900xepyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7282_firmwareepyc_7f32epyc_7272_firmwareepyc_7713pepyc_7573xryzen_3_3100_firmwareepyc_7513ryzen_threadripper_2950x_firmwareryzen_9_5900x_firmwareryzen_5_2500uepyc_7232p_firmwareryzen_9_5980hxepyc_7702ryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwareryzen_5_5600xryzen_threadripper_pro_5995wxepyc_7453ryzen_5_5600hsryzen_3_2300uepyc_7373xryzen_7_5825uepyc_7513_firmwareryzen_7_5825u_firmwareepyc_7542epyc_7413_firmwareryzen_threadripper_3960x_firmwareryzen_7_5800x3d_firmwareryzen_threadripper_3960xryzen_threadripper_2950xryzen_5_2700_firmwareryzen_threadripper_pro_3975wxepyc_7643_firmwareryzen_threadripper_1950x_firmwareryzen_5_5560uepyc_7f52epyc_75f3ryzen_threadripper_pro_5945wxepyc_7373x_firmwareryzen_5_2500u_firmwareepyc_7f32_firmwareryzen_3_3100epyc_7502epyc_7662_firmwareepyc_7f72_firmwareepyc_75f3_firmwareepyc_7473x_firmwareepyc_7343_firmwareryzen_7_5700u_firmwareryzen_3_2200u_firmwareryzen_threadripper_1900x_firmwareryzen_9_5900hsryzen_3_2200uepyc_7313pryzen_7_5700gryzen_threadripper_2920xryzen_9_5980hsryzen_3_5125c_firmwareepyc_7573x_firmwareryzen_5_5500u_firmwareryzen_7_2700x_firmwareryzen_7_2700ryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_5800h_firmwareepyc_7352ryzen_5_2600hepyc_7713_firmwareepyc_7742ryzen_5_5500epyc_7272ryzen_7_2700uryzen_3_5400uepyc_7713epyc_7443p_firmwareryzen_5_5600_firmwareryzen_7_5800xryzen_7_2800hepyc_7773xryzen_threadripper_3990x_firmwareryzen_5_2600x_firmwareryzen_5_5600x_firmwareryzen_7_5800x3dryzen_9_5980hs_firmwareryzen_threadripper_3990xryzen_5_5600hs_firmwareryzen_7_2700_firmwareryzen_5_5600h_firmwareryzen_threadripper_pro_5955wxryzen_5_5500uryzen_3_5400u_firmwareepyc_7742_firmwareryzen_9_5950xryzen_5_5500_firmwareryzen_threadripper_2990wx_firmwareryzen_3_3200u_firmwareryzen_3_3300x_firmwareepyc_7402pepyc_7343ryzen_5_5600hepyc_7252_firmwareryzen_threadripper_1920x_firmwareryzen_3_5300u_firmwareepyc_7542_firmwareepyc_7763_firmwareryzen_3_5300uryzen_threadripper_pro_5945wx_firmwareryzen_5_5600gryzen_3_5425u_firmwareepyc_7313p_firmwareepyc_7252epyc_7502pryzen_threadripper_1900xryzen_5_5600uryzen_threadripper_pro_5975wxepyc_7302p_firmwareryzen_3_2300u_firmwareryzen_9_5900hx_firmwareryzen_9_5950x_firmwareepyc_7642_firmwareryzen_threadripper_2970wxepyc_7452ryzen_7_5800x_firmwareepyc_7543p_firmwareryzen_5_2600xryzen_7_2700u_firmwareryzen_5_5625uryzen_threadripper_2920x_firmwareepyc_7302ryzen_5_2700ryzen_7_5700uryzen_3_5125cryzen_7_2800h_firmwareepyc_7232pryzen_threadripper_1950xryzen_threadripper_pro_3945wx_firmwareryzen_9_5900hs_firmwareepyc_7663ryzen_5_5600u_firmwareepyc_7552_firmwareepyc_7773x_firmwareepyc_72f3_firmwareepyc_7f72epyc_7662ryzen_7_5700g_firmwareepyc_7642epyc_7473xryzen_threadripper_2970wx_firmwareryzen_threadripper_pro_5975wx_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareepyc_7413ryzen_7_2700xryzen_7_5700x_firmwareepyc_7663_firmwareryzen_threadripper_pro_3955wxryzen_7_5800u_firmwareryzen_3_3200uepyc_7552epyc_7302pepyc_7702p_firmwareryzen_3_3300epyc_74f3_firmwareryzen_3_5425uepyc_7302_firmwareepyc_7763ryzen_threadripper_pro_3955wx_firmwareryzen_5_5560u_firmwareepyc_7402_firmwareryzen_9_5980hx_firmwareepyc_7713p_firmwareryzen_threadripper_1920xepyc_73f3_firmwareepyc_7702pryzen_threadripper_pro_3995wx_firmwareepyc_7f52_firmwareepyc_7262ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxryzen_7_5800uryzen_9_5900hxryzen_3_3250uryzen_5_5600g_firmwareepyc_72f3epyc_7643epyc_7402p_firmwareepyc_7452_firmwareryzen_threadripper_2990wxryzen_5_5600ryzen_threadripper_3970xryzen_7_5800hepyc_7543pepyc_7443pryzen_threadripper_3970x_firmwareryzen_threadripper_pro_3945wxryzen_3_3250u_firmwareepyc_7453_firmwareryzen_threadripper_pro_3975wx_firmwareepyc_7282ryzen_7_5800hs_firmwareryzen_threadripper_pro_5995wx_firmwareepyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7532ryzen_5_5625u_firmwareryzen_7_5700xepyc_73f3Athlon™ SeriesRyzen™ SeriesEPYC™ Processors
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-5147
Matching Score-6
Assigner-Talos
ShareView Details
Matching Score-6
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.45% / 62.54%
||
7 Day CHG~0.00%
Published-25 Jan, 2020 | 17:53
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13003.1007. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

Action-Not Available
Vendor-n/aAdvanced Micro Devices, Inc.VMware (Broadcom Inc.)
Product-workstationatidxx64AMD
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-12905
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.85%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 19:40
Updated-17 Sep, 2024 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-5146
Matching Score-6
Assigner-Talos
ShareView Details
Matching Score-6
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.45% / 62.54%
||
7 Day CHG~0.00%
Published-25 Jan, 2020 | 17:53
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13025.10004. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

Action-Not Available
Vendor-n/aAdvanced Micro Devices, Inc.VMware (Broadcom Inc.)
Product-workstationatidxx64AMD
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-5124
Matching Score-6
Assigner-Talos
ShareView Details
Matching Score-6
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.45% / 62.54%
||
7 Day CHG~0.00%
Published-25 Jan, 2020 | 17:53
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.50005. A specially crafted pixel shader can cause a denial of service. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

Action-Not Available
Vendor-n/aAdvanced Micro Devices, Inc.VMware (Broadcom Inc.)
Product-workstationatidxx64AMD
CWE ID-CWE-125
Out-of-bounds Read
CVE-2019-5098
Matching Score-6
Assigner-Talos
ShareView Details
Matching Score-6
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.57% / 67.63%
||
7 Day CHG~0.00%
Published-05 Dec, 2019 | 17:24
Updated-04 Aug, 2024 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable out-of-bounds read vulnerability exists in AMD ATIDXX64.DLL driver, version 26.20.13001.29010. A specially crafted pixel shader can cause out-of-bounds memory read. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.

Action-Not Available
Vendor-n/aAdvanced Micro Devices, Inc.VMware (Broadcom Inc.)Microsoft Corporation
Product-workstationradeon_rx_550_firmwareradeon_550_firmwareradeon_rx_550radeon_550windows_10AMD ATI
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-46772
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-3.9||LOW
EPSS-0.04% / 9.64%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 16:50
Updated-05 Nov, 2024 | 22:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the ABL may allow a privileged attacker with access to the BIOS menu or UEFI shell to tamper with the structure headers in SPI ROM causing an out of bounds memory read and write, potentially resulting in memory corruption or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD Ryzen™ Embedded V2000 Series ProcessorsAMD Ryzen™ Embedded 5000 Series ProcessorsAMD Ryzen™ Embedded R2000 Series ProcessorsAMD Ryzen™ Threadripper™ PRO 3000WX Series ProcessorsAMD Ryzen™ 3000 Series Desktop ProcessorsAMD Ryzen™ 5000 Series Desktop Processor with Radeon™ GraphicsAMD Athlon™ 3000 Series Desktop Processors with Radeon™ GraphicsAMD Ryzen™ 4000 Series Mobile Processors with Radeon™ GraphicsAMD Athlon™ 3000 Series Mobile Processors with Radeon™ GraphicsAMD Ryzen™ 7020 Series Processors with Radeon™ GraphicsAMD Ryzen™ 5000 Series Desktop ProcessorsAMD EPYC™ Embedded 7002 Series ProcessorsAMD Ryzen™ 5000 Series Mobile Processors with Radeon™ GraphicsAMD EPYC™ 7002 Series ProcessorsAMD Ryzen™ 6000 Series Processors with Radeon™ GraphicsAMD Ryzen™ Threadripper™ PRO 5000WX ProcessorsAMD Ryzen™ 3000 Series Mobile Processor with Radeon™ GraphicsAMD EPYC™ Embedded 7003 Series ProcessorsAMD Ryzen™ Embedded V1000 Series ProcessorsAMD Ryzen™ Embedded V3000 Series ProcessorsAMD Ryzen™ Embedded R1000 Series ProcessorsAMD Ryzen™ Threadripper™ 3000 Series ProcessorsAMD Ryzen™ 3000 Series Processors with Radeon™ GraphicsAMD Ryzen™ 7035 Series Processors with Radeon™ GraphicsAMD EPYC™ 7003 Series ProcessorsAMD Ryzen™ 5000 Series Processors with Radeon™ GraphicsAMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-26384
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.8||HIGH
EPSS-0.14% / 33.99%
||
7 Day CHG~0.00%
Published-14 Jul, 2022 | 19:28
Updated-16 Sep, 2024 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malformed SMI (System Management Interface) command may allow an attacker to establish a corrupted SMI Trigger Info data structure, potentially leading to out-of-bounds memory reads and writes when triggering an SMI resulting in a potential loss of resources.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_3_3200u_firmwareryzen_5_2700x_firmwareryzen_3_3450uryzen_5_5600hathlon_silver_3050u_firmwareryzen_3_3300uryzen_3_3550hryzen_5_5600gryzen_3_5425cryzen_3_5425u_firmwareryzen_5_5600uryzen_5_2500uryzen_9_5980hxryzen_3_3750hryzen_3_2300u_firmwareryzen_7_5800hsryzen_9_5900hx_firmwareryzen_5_5600hsryzen_3_5300geryzen_3_2300uryzen_5_5600geryzen_7_5825uryzen_5_2600xryzen_7_5825u_firmwareryzen_3_3550h_firmwareryzen_3_5300ge_firmwareryzen_5_5625uryzen_7_2700u_firmwareryzen_7_5700geryzen_5_2700ryzen_3_3780u_firmwareryzen_3_5125cryzen_7_2800h_firmwareryzen_5_2700_firmwareryzen_3_3500u_firmwareryzen_3_3700cryzen_5_5560uryzen_9_5900hs_firmwareryzen_5_5600u_firmwareryzen_5_2500u_firmwareryzen_7_5700g_firmwareryzen_3_2200u_firmwareryzen_9_5900hsryzen_3_2200uryzen_7_2700xryzen_3_3500cryzen_3_3500uryzen_7_5700gryzen_9_5980hsryzen_3_5300g_firmwareryzen_3_5125c_firmwareryzen_7_5800u_firmwareryzen_3_3200uryzen_7_5825c_firmwareryzen_5_2600ryzen_7_5800h_firmwareryzen_7_2700ryzen_7_2700x_firmwareryzen_5_5625c_firmwareryzen_3_3580u_firmwareathlon_silver_3050uryzen_3_3700u_firmwareryzen_5_2600hryzen_5_5625cryzen_3_5425uryzen_9_5980hx_firmwareryzen_5_5560u_firmwareryzen_7_2700uryzen_3_3750h_firmwareryzen_3_5400uryzen_3_3580uryzen_7_5825cryzen_3_3500c_firmwareryzen_7_5800uryzen_7_2800hryzen_5_2600h_firmwareryzen_3_3700uryzen_9_5900hxryzen_3_3700c_firmwareryzen_3_3250uryzen_5_5600g_firmwareryzen_9_5980hs_firmwareryzen_5_2600x_firmwareryzen_3_5300gathlon_gold_3150u_firmwareryzen_5_5600ge_firmwareryzen_5_5600hs_firmwareryzen_7_2700_firmwareryzen_3_5425c_firmwareathlon_gold_3150uryzen_5_5600h_firmwareryzen_3_3350u_firmwareryzen_5_2700xryzen_7_5800hryzen_3_5400u_firmwareryzen_5_2600_firmwareryzen_3_3780uryzen_3_3250u_firmwareryzen_3_3300u_firmwareryzen_3_3450u_firmwareryzen_7_5800hs_firmwareryzen_5_5625u_firmwareryzen_7_5700ge_firmwareryzen_3_3350uAthlon™ SeriesRyzen™ Series
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-26365
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-8.2||HIGH
EPSS-0.17% / 39.15%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 18:58
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_3_2300u_firmwareryzen_7_5700x_firmwareryzen_9_6900hxryzen_3_3250c_firmwareryzen_5_6600hsryzen_3_5300gryzen_7_6800u_firmwareryzen_7_5700uryzen_5_6600uryzen_5_5600_firmwareryzen_5_6600hs_firmwareamd_3015ceryzen_5_5600x_firmwareryzen_9_6980hx_firmwareryzen_5_3400gryzen_7_2700uryzen_5_6600u_firmwareryzen_7_5800xryzen_5_pro_3400geryzen_5_5600gryzen_5_pro_3350g_firmwareryzen_7_6800hsryzen_3_2300uryzen_7_5700xryzen_7_5800x3d_firmwareryzen_5_5600xryzen_3_pro_3200gryzen_9_6980hs_firmwareamd_3015eryzen_3_5300g_firmwareryzen_3_2200g_firmwareryzen_5_2500u_firmwareryzen_5_pro_3400g_firmwareryzen_5_2600hryzen_3_pro_3200ge_firmwareryzen_9_6980hxryzen_3_3200geryzen_3_3250u_firmwareryzen_7_2800hryzen_5_5600ge_firmwareryzen_5_5600ryzen_5_2400ge_firmwareryzen_5_pro_3350ge_firmwareryzen_5_5500_firmwareryzen_9_6900hsryzen_7_5700u_firmwareryzen_5_3400g_firmwareryzen_3_5300ge_firmwareryzen_3_2200u_firmwareryzen_9_5900ryzen_9_5900x_firmwareryzen_5_2400g_firmwareryzen_3_3200u_firmwareryzen_5_6600h_firmwareryzen_5_pro_3350geryzen_5_2600h_firmwareryzen_7_5700ge_firmwareryzen_3_2200gryzen_3_3200ge_firmwareryzen_5_5500uryzen_7_5800_firmwareryzen_5_pro_3400gryzen_3_5300u_firmwareryzen_7_5700geryzen_5_2500uryzen_3_3200g_firmwareryzen_7_5800x_firmwareryzen_5_pro_3350gryzen_7_5800x3damd_3015e_firmwareryzen_7_2800h_firmwareryzen_9_5900_firmwareryzen_7_5800ryzen_7_6800uamd_3015ce_firmwareryzen_9_6900hx_firmwareryzen_5_6600hryzen_3_3250uryzen_7_6800h_firmwareryzen_3_2200geryzen_5_5600geryzen_5_5600g_firmwareryzen_5_5500u_firmwareryzen_9_6980hsryzen_5_pro_3400ge_firmwareryzen_5_2400gryzen_9_5950xryzen_3_pro_2100ge_firmwareryzen_9_5900xryzen_3_3200gryzen_3_2200ge_firmwareryzen_7_2700u_firmwareryzen_7_6800hs_firmwareryzen_9_5950x_firmwareryzen_5_2400geryzen_3_5300uryzen_3_pro_2100geryzen_5_5500ryzen_9_6900hs_firmwareryzen_7_5700gryzen_7_6800hryzen_3_3200uryzen_3_3250cryzen_3_pro_3200geryzen_3_pro_3200g_firmwareryzen_3_5300geryzen_3_2200uryzen_7_5700g_firmwareAthlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”Ryzen™ 2000 Series Mobile Processors “Raven Ridge” FP5Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULPRyzen™ 2000 series Desktop Processors “Raven Ridge” AM4Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne”Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”Ryzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso”Ryzen™ 6000 Series Mobile Processors "Rembrandt"
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-34049
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.57%
||
7 Day CHG~0.00%
Published-29 Apr, 2024 | 00:00
Updated-27 May, 2025 | 12:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return plmnIdString[0:3], plmnIdString[3:]" in reader.go.

Action-Not Available
Vendor-onosprojectn/aonosproject
Product-traffic_steering_xapplicationn/arimedo-ts
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-24315
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.5||HIGH
EPSS-0.64% / 69.69%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:05
Updated-03 Aug, 2024 | 04:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service when an attacker repeatedly sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)

Action-Not Available
Vendor-n/a
Product-interactive_graphical_scada_system_data_serverInteractive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-39516
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-8.7||HIGH
EPSS-0.21% / 43.85%
||
7 Day CHG~0.00%
Published-09 Oct, 2024 | 20:00
Updated-16 Oct, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash

An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems configured in either of two ways: * systems with BGP traceoptions enabled * systems with BGP traffic engineering configured This issue can affect iBGP and eBGP with any address family configured. The specific attribute involved is non-transitive, and will not propagate across a network. This issue affects: Junos OS:  * All versions before 21.4R3-S8, * 22.2 before 22.2R3-S5,  * 22.3 before 22.3R3-S4,  * 22.4 before 22.4R3-S3,  * 23.2 before 23.2R2-S2,  * 23.4 before 23.4R2;  Junos OS Evolved:  * All versions before 21.4R3-S8-EVO,  * 22.2-EVO before 22.2R3-S5-EVO,  * 22.3-EVO before 22.3R3-S4-EVO,  * 22.4-EVO before 22.4R3-S3-EVO,  * 23.2-EVO before 23.2R2-S2-EVO,  * 23.4-EVO before 23.4R2-EVO.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-Junos OSJunos OS Evolvedjunos_os_evolvedjunos
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-3036
Matching Score-4
Assigner-Cloudflare, Inc.
ShareView Details
Matching Score-4
Assigner-Cloudflare, Inc.
CVSS Score-8.6||HIGH
EPSS-0.47% / 63.61%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 11:08
Updated-02 Jan, 2025 | 19:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out of Bounds Slice index in cfnts leads to remote panic

An unchecked read in NTP server in github.com/cloudflare/cfnts prior to commit 783490b https://github.com/cloudflare/cfnts/commit/783490b913f05e508a492cd7b02e3c4ec2297b71  enabled a remote attacker to trigger a panic by sending an NTSAuthenticator packet with extension length longer than the packet contents.

Action-Not Available
Vendor-Cloudflare, Inc.
Product-cfntscfnts
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-42477
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 16.95%
||
7 Day CHG~0.00%
Published-12 Aug, 2024 | 15:02
Updated-15 Aug, 2024 | 14:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
llama.cpp global-buffer-overflow in ggml_type_size

llama.cpp provides LLM inference in C/C++. The unsafe `type` member in the `rpc_tensor` structure can cause `global-buffer-overflow`. This vulnerability may lead to memory data leakage. The vulnerability is fixed in b3561.

Action-Not Available
Vendor-ggerganovggerganovggerganov
Product-llama.cppllama.cppllama.cpp
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2022-24314
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.5||HIGH
EPSS-0.63% / 69.30%
||
7 Day CHG~0.00%
Published-09 Feb, 2022 | 22:05
Updated-03 Aug, 2024 | 04:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-125: Out-of-bounds Read vulnerability exists that could cause memory leaks potentially resulting in denial of service when an attacker repeatedly sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)

Action-Not Available
Vendor-n/a
Product-interactive_graphical_scada_system_data_serverInteractive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-38148
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-28.25% / 96.33%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 17:30
Updated-10 Jul, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Secure Channel Denial of Service Vulnerability

Windows Secure Channel Denial of Service Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2022_23h2windows_11_22h2windows_11_24h2windows_11_21h2windows_server_2022windows_11_23h2Windows 11 version 22H3Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2022Windows 11 version 22H2Windows 11 Version 24H2Windows 11 Version 23H2Windows 11 version 21H2
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-23937
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 40.36%
||
7 Day CHG~0.00%
Published-29 Mar, 2022 | 01:21
Updated-03 Aug, 2024 | 03:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Wind River VxWorks 6.9 and 7, a specific crafted packet may lead to an out-of-bounds read during an IKE initial exchange scenario.

Action-Not Available
Vendor-windrivern/a
Product-vxworksn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-38405
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.66%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-07 Nov, 2024 | 20:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Host

Transient DOS while processing the CU information from RNR IE.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qam8255p_firmwarewsa8830qca6777aqsxr2230p_firmwareqca8337qam8650pqfw7124qam8775pqamsrv1mqca6777aq_firmwareqcn6224_firmwarewsa8840srv1l_firmwarewcn6755_firmwareqca6595au_firmwarevideo_collaboration_vc3_platformwcd9370ssg2115pqcm5430_firmwareqca6584au_firmwaresnapdragon_8_gen_2_mobile_platformqamsrv1hsa8530pqca6554a_firmwarewcd9385_firmwareqam8295pwcn7881_firmwareqamsrv1h_firmwareqca6688aqqam8295p_firmwaresa9000p_firmwareqca6574au_firmwaresa7255pwsa8845h_firmwarewcd9375_firmwaresnapdragon_8_gen_3_mobile_platformqfw7114qca8081_firmwareqca6595auwcn7860qca6564au_firmwaresa8620p_firmwaresa6155p_firmwareqca6584auqcm8550_firmwareqcn9274wcn7881snapdragon_x72_5g_modem-rf_systemqca6678aq_firmwaresa8775p_firmwareqcs6490wsa8840_firmwareqca6698aqvideo_collaboration_vc5_platformqcs8550_firmwaresm8635wcn7880_firmwaresrv1hsa7775p_firmwarewcd9340sa8195pfastconnect_6700_firmwareqcn6224wsa8845hwcn6755wcd9395_firmwaresnapdragon_x75_5g_modem-rf_systemsnapdragon_ar2_gen_1_platform_firmwaresm8750p_firmwaresm8750_firmwaresa8255p_firmwaresa6155pqcs7230qca8081snapdragon_auto_5g_modem-rf_gen_2qca6698aq_firmwaresa7775psxr2250pqcs5430qam8620pwcd9385snapdragon_auto_5g_modem-rf_gen_2_firmwaresa8770p_firmwaresa8255pqam8775p_firmwareqca6696_firmwareqcs6490_firmwareqca6797aqar8035wcd9375wcd9390qcc710_firmwarewsa8830_firmwareqcm6490wsa8835_firmwaresa8195p_firmwarevideo_collaboration_vc5_platform_firmwaresxr2250p_firmwaresa8295p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwarewcn7880sa8770pqca6787aq_firmwareqca6688aq_firmwarewcd9380_firmwareqca8337_firmwaressg2125pqca6554aqca6595qcm8550qca6564auqcs7230_firmwaresa8530p_firmwarewsa8835qca6574sxr1230p_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwaresa8540p_firmwarewcd9380qcn6274snapdragon_x72_5g_modem-rf_system_firmwarefastconnect_6700ssg2125p_firmwaresm8635_firmwareqca6574asxr1230pvideo_collaboration_vc3_platform_firmwareqfw7114_firmwareqcn9274_firmwareqcc2076_firmwarewsa8845qcc2073_firmwaresa8650psa9000pqca6574_firmwarewcd9340_firmwaresxr2230pwsa8845_firmwareqcs8250sm8750psa8775pqca6574a_firmwareqcs9100_firmwareqca6391sa8295pfastconnect_7800qcn6274_firmwareqca6678aqwcn7861_firmwareqcm6490_firmwarewsa8832_firmwaresa8650p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900srv1h_firmwarefastconnect_6900_firmwareqca6797aq_firmwareqca6574ausa8155p_firmwaresrv1lsa7255p_firmwareqcs8250_firmwaresnapdragon_8\+_gen_2_mobile_platformfastconnect_7800_firmwaresa8620pwsa8832sa8540psm8550psrv1m_firmwaresnapdragon_ar2_gen_1_platformqcm5430qamsrv1m_firmwaresm8750qam8650p_firmwareqcc710wcn7860_firmwareqca6595_firmwarewcn7861wcd9395qcs5430_firmwareqca6787aqqca6696qca6391_firmwareqcs8550wcd9370_firmwaresm8550p_firmwarewcd9390_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresa8155pqcs9100qcc2076srv1mssg2115p_firmwareqam8620p_firmwareqfw7124_firmwareqam8255pqcc2073ar8035_firmwareSnapdragonqam8255p_firmwareqca8337_firmwarewcd9380_firmwaresxr2230p_firmwareqcs7230_firmwarear8035_firmwareqca6777aq_firmwaresa8530p_firmwareqcn6224_firmwaresxr1230p_firmwaresa8540p_firmwaresrv1l_firmwarewcn6755_firmwareqca6595au_firmwaresnapdragon_x72_5g_modem-rf_system_firmwaressg2125p_firmwaresm8635_firmwareqcm5430_firmwareqca6584au_firmwareqcn9274_firmwareqcc2076_firmwareqfw7114_firmwareqca6554a_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwarewcn7881_firmwareqcc2073_firmwareqamsrv1h_firmwareqca6574_firmwarewcd9340_firmwarewsa8845_firmwareqam8295p_firmwaresa9000p_firmwareqca6574a_firmwareqca6574au_firmwareqcs9100_firmwarewcd9375_firmwareqca8081_firmwarewsa8845h_firmwareqca6564au_firmwaresa8620p_firmwaresa6155p_firmwareqcm8550_firmwareqca6678aq_firmwareqcn6274_firmwaresa8775p_firmwarewcn7861_firmwareqcm6490_firmwarewsa8840_firmwaresa8650p_firmwarewsa8832_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarefastconnect_6900_firmwaresrv1h_firmwareqcs8550_firmwareqca6797aq_firmwarewcn7880_firmwaresa8155p_firmwaresa7775p_firmwarefastconnect_6700_firmwaresa7255p_firmwareqcs8250_firmwarefastconnect_7800_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwaresm8750_firmwaresm8750p_firmwarewcd9395_firmwareqca6698aq_firmwareqamsrv1m_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqam8775p_firmwareqca6696_firmwareqcs6490_firmwarewcn7860_firmwareqca6595_firmwareqcs5430_firmwareqca6391_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwareqcc710_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwaresxr2250p_firmwarewsa8835_firmwaresa8195p_firmwaressg2115p_firmwareqam8620p_firmwareqfw7124_firmwaresa8295p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqca6688aq_firmwareqca6787aq_firmware
CWE ID-CWE-126
Buffer Over-read
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-38397
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.19%
||
7 Day CHG~0.00%
Published-07 Oct, 2024 | 12:58
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Buffer Over-read in WLAN Host Communication

Transient DOS while parsing probe response and assoc response frame.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_8_gen_3_mobile_platform_firmwareqcm8550_firmwarewsa8845_firmwareqca8386_firmwareqca6678aq_firmwarewsa8832qcn9000_firmwareqca8082_firmwareipq9574srv1lqca6595wcd9370srv1mqcn6432_firmwareqca8081_firmwareqca6678aqar8035_firmwareqca6696qam8620p_firmwarewcd9340_firmwarewcd9395_firmwareqca0000_firmwareqcc710_firmwareipq9554ipq9008qca6564aufastconnect_6700qcn6422_firmwareipq9008_firmwareqcn9074qcn5124_firmwareipq5300_firmwarewsa8832_firmwaresa8195p_firmwareqca8337_firmwareqca8337wcd9395ipq5332sg8275p_firmwareqcm6490_firmwareqca6574au_firmwareqam8295psnapdragon_x72_5g_modem-rf_system_firmwarewcd9390qca6574auipq5312sa8620p_firmwareflight_rb5_5g_platformwsa8845h_firmwaresa9000p_firmwaresrv1hsnapdragon_x65_5g_modem-rf_system_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6797aq_firmwareqca8085_firmwareqcf8001_firmwareqca6554aqcs5430sa8295p_firmwareqcm5430qcm5430_firmwaresa8770pqcn9000qcn6274_firmwaressg2115pqca6584auqcc710snapdragon_x72_5g_modem-rf_systemqfw7114_firmwareqcs7230qca6595_firmwareqcn6402qcn6422fastconnect_7800_firmwareqcn6432fastconnect_6900ipq5332_firmwaresa7255pipq5302_firmwareqfw7114ipq5300wcd9385_firmwareipq9574_firmwarefastconnect_6900_firmwareqam8255p_firmwarewcd9380qam8255psxr2230psnapdragon_ar2_gen_1_platform_firmwareqca8075_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845qcf8000sa6155pimmersive_home_3210_platform_firmwareqca6564au_firmwaresxr1230pqca8075video_collaboration_vc5_platform_firmwareqam8650psa9000psnapdragon_8\+_gen_2_mobile_platformsrv1h_firmwareqca8085sdx65m_firmwarevideo_collaboration_vc3_platformqca6595ausxr2250p_firmwaresa6155p_firmwarewsa8840qca6688aqqam8295p_firmwaresrv1m_firmwareqcs8550_firmwareqcn6402_firmwareqam8620pqfw7124_firmwarewcd9385qca6698aq_firmwareqca8084_firmwaresnapdragon_8_gen_2_mobile_platformqcf8001sa8255pqcs7230_firmwareqca8084sxr1230p_firmwarewcd9390_firmwaresnapdragon_8_gen_3_mobile_platformsdx65msg8275pwcd9370_firmwaressg2125pqca6554a_firmwaresa7255p_firmwareqca6574aipq9570sa8195pwcd9340qcs8250_firmwareqamsrv1msnapdragon_auto_5g_modem-rf_gen_2immersive_home_326_platformqcm6490ipq5302qam8650p_firmwarevideo_collaboration_vc5_platformsxr2250psm8550p_firmwareqcm8550immersive_home_3210_platformqcs6490_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9274qcn9024qca6584au_firmwaresa8775pqrb5165n_firmwaresnapdragon_x75_5g_modem-rf_systemqfw7124wsa8835wsa8840_firmwaresxr2230p_firmwareqcn6274qca6595au_firmwareqca6574qca6391_firmwareqca0000ipq9570_firmwaresa8775p_firmwaresnapdragon_ar2_gen_1_platformqcn6412_firmwareqca6696_firmwarewsa8845hqcn9024_firmwareqamsrv1hwcd9380_firmwareqca8082qca6574_firmwaresa8155p_firmwareqca8081sa8155pwsa8830qcn5124qca6797aqqam8775psm8550pqcf8000_firmwareipq5312_firmwareqcn9074_firmwareqcn6412sa8620psa8255p_firmwareflight_rb5_5g_platform_firmwareqca6574a_firmwarear8035qamsrv1m_firmwaresa8650p_firmwarewcd9375_firmwarerobotics_rb5_platformsa7775psrv1l_firmwareqca8386qca6391qcn6224qcn9274_firmwareqcs5430_firmwaressg2125p_firmwaresa7775p_firmwareqca6698aqsnapdragon_8_gen_2_mobile_platform_firmwaresa8770p_firmwaresa8295pqrb5165nrobotics_rb5_platform_firmwareqcs8550fastconnect_7800sa8650pqam8775p_firmwarewcd9375qca6688aq_firmwarefastconnect_6700_firmwareqamsrv1h_firmwarevideo_collaboration_vc3_platform_firmwarewsa8835_firmwaressg2115p_firmwaresnapdragon_x75_5g_modem-rf_system_firmwareqcs6490qcs8250immersive_home_326_platform_firmwareipq9554_firmwarewsa8830_firmwareqcn6224_firmwareSnapdragonqam8255p_firmwarerobotics_rb5_platform_firmwareqca8337_firmwarewcd9380_firmwaresxr2230p_firmwareqcf8000_firmwaresg8275p_firmwareqcs7230_firmwarear8035_firmwareflight_rb5_5g_platform_firmwareqcn6224_firmwareimmersive_home_326_platform_firmwaresxr1230p_firmwareqcn6402_firmwaresrv1l_firmwareqca6595au_firmwareipq9554_firmwaresnapdragon_x72_5g_modem-rf_system_firmwareqca8075_firmwaressg2125p_firmwareqca0000_firmwareqcm5430_firmwareqca6584au_firmwareqrb5165n_firmwareqcn9000_firmwareqcn9274_firmwareqfw7114_firmwareqca6554a_firmwarequalcomm_video_collaboration_vc3_platform_firmwarewcd9385_firmwareqca8386_firmwareqamsrv1h_firmwareqca6574_firmwarewcd9340_firmwareqca8084_firmwareqcn5124_firmwarewsa8845_firmwareqam8295p_firmwareqca8082_firmwaresa9000p_firmwareqca6574a_firmwareqca6574au_firmwareqcn6422_firmwarewcd9375_firmwareqca8081_firmwarewsa8845h_firmwareipq9574_firmwareimmersive_home_3210_platform_firmwareqca6564au_firmwaresa8620p_firmwaresa6155p_firmwaresnapdragon_x65_5g_modem-rf_system_firmwareqcm8550_firmwareqca6678aq_firmwareqcn6274_firmwaresa8775p_firmwareipq5300_firmwareqcm6490_firmwarewsa8840_firmwaresa8650p_firmwareipq9570_firmwaresnapdragon_x75_5g_modem-rf_system_firmwarewsa8832_firmwareqcf8001_firmwarefastconnect_6900_firmwaresrv1h_firmwareqcs8550_firmwareqca6797aq_firmwareipq5312_firmwareqcn6432_firmwaresa8155p_firmwaresa7775p_firmwarefastconnect_6700_firmwareqcn9024_firmwaresa7255p_firmwareqcs8250_firmwarefastconnect_7800_firmwaresnapdragon_ar2_gen_1_platform_firmwaresa8255p_firmwarewcd9395_firmwareqcn6412_firmwareipq5332_firmwareipq5302_firmwareqca6698aq_firmwareqamsrv1m_firmwaresdx65m_firmwaresrv1m_firmwareqam8650p_firmwaresa8770p_firmwareqca8085_firmwareqam8775p_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwareqca6696_firmwareqcs6490_firmwareqca6595_firmwareqcs5430_firmwareipq9008_firmwareqca6391_firmwarewcd9370_firmwaresm8550p_firmwarequalcomm_video_collaboration_vc5_platform_firmwareqcc710_firmwaresnapdragon_8_gen_3_mobile_platform_firmwarewcd9390_firmwarewsa8830_firmwaresxr2250p_firmwarewsa8835_firmwaresa8195p_firmwaressg2115p_firmwareqcn9074_firmwareqam8620p_firmwareqfw7124_firmwaresa8295p_firmwaresnapdragon_8_gen_2_mobile_platform_firmwareqca6688aq_firmware
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-126
Buffer Over-read
CVE-2024-38073
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-4.30% / 88.42%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 17:03
Updated-05 May, 2025 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Remote Desktop Licensing Service Denial of Service Vulnerability

Windows Remote Desktop Licensing Service Denial of Service Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-Windows Server 2022Windows Server 2012Windows Server 2012 R2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2012 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2016Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2Windows Server 2019Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2016 (Server Core installation)Windows Server 2019 (Server Core installation)
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-29089
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.16% / 37.70%
||
7 Day CHG~0.00%
Published-14 Apr, 2023 | 00:00
Updated-07 Feb, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding SIP multipart messages.

Action-Not Available
Vendor-n/aSamsung
Product-exynos_980exynos_auto_t5123exynos_9110_firmwareexynos_1080exynos_5123_firmwareexynos_auto_t5123_firmwareexynos_9110exynos_980_firmwareexynos_5300exynos_1080_firmwareexynos_5300_firmwareexynos_5123n/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-37795
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.27%
||
7 Day CHG~0.00%
Published-17 Jun, 2024 | 00:00
Updated-02 Aug, 2024 | 03:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A segmentation fault in CVC5 Solver v1.1.3 allows attackers to cause a Denial of Service (DoS) via a crafted SMT-LIB input file containing the `set-logic` command with specific formatting errors.

Action-Not Available
Vendor-n/acvc5
Product-n/acvc5
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-38649
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-4.42% / 88.60%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 01:54
Updated-16 Jul, 2025 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds write in IPsec of Ivanti Connect Secure before version 22.7R2.1(Not Applicable to 9.1Rx) allows a remote unauthenticated attacker to cause a denial of service.

Action-Not Available
Vendor-Ivanti Software
Product-connect_secureConnect Secureconnect_secure
CWE ID-CWE-125
Out-of-bounds Read
CVE-2020-24387
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.79% / 72.91%
||
7 Day CHG~0.00%
Published-19 Oct, 2020 | 19:39
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.

Action-Not Available
Vendor-yubicon/aFedora Project
Product-yubihsm-shellfedoran/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-36981
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.61%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 14:35
Updated-26 Sep, 2024 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds read vulnerability exists in the OpenPLC Runtime EtherNet/IP PCCC parser functionality of OpenPLC_v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted network request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.This is the final instance of the incorrect comparison.

Action-Not Available
Vendor-openplcprojectOpenPLCopenplcproject
Product-openplc_v3_firmwareOpenPLC_v3openplc_v3
CWE ID-CWE-125
Out-of-bounds Read
CVE-2023-3040
Matching Score-4
Assigner-Cloudflare, Inc.
ShareView Details
Matching Score-4
Assigner-Cloudflare, Inc.
CVSS Score-3.7||LOW
EPSS-0.10% / 28.82%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 11:54
Updated-02 Jan, 2025 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Out of Bounds Access Leading to Undefined Behavior

A debug function in the lua-resty-json package, up to commit id 3ef9492bd3a44d9e51301d6adc3cd1789c8f534a (merged in PR #14) contained an out of bounds access bug that could have allowed an attacker to launch a DoS if the function was used to parse untrusted input data. It is important to note that because this debug function was only used in tests and demos, it was not exploitable in a normal environment.

Action-Not Available
Vendor-Cloudflare, Inc.
Product-lua-resty-jsonlua-resty-json
CWE ID-CWE-125
Out-of-bounds Read
CVE-2024-36980
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.30% / 52.72%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 14:35
Updated-26 Sep, 2024 | 20:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An out-of-bounds read vulnerability exists in the OpenPLC Runtime EtherNet/IP PCCC parser functionality of OpenPLC_v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted network request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.This is the first instance of the incorrect comparison.

Action-Not Available
Vendor-openplcprojectOpenPLCopenplcproject
Product-openplc_v3_firmwareOpenPLC_v3openplc_v3
CWE ID-CWE-125
Out-of-bounds Read
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 10
  • 11
  • Next
Details not found