Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-26369 (GCVE-0-2021-26369)
Vulnerability from cvelistv5 – Published: 2022-05-12 17:07 – Updated: 2024-09-16 19:51
VLAI?
EPSS
Summary
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
Severity ?
No CVSS data available.
CWE
- tbd
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://www.amd.com/en/corporate/product-security… | x_refsource_MISC |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| AMD | Ryzen™ Series |
Affected:
various
|
|
| AMD | Athlon™ Series |
Affected:
various
|
Date Public ?
2022-05-10 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:26:24.431Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Ryzen\u2122 Series",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
},
{
"product": "Athlon\u2122 Series",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various"
}
]
}
],
"datePublic": "2022-05-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "tbd",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-12T17:07:32.000Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"source": {
"advisory": "AMD-SB-1027",
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
"ID": "CVE-2021-26369",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Ryzen\u2122 Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
},
{
"product_name": "Athlon\u2122 Series",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
}
]
},
"vendor_name": "AMD"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "tbd"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
"refsource": "MISC",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
]
},
"source": {
"advisory": "AMD-SB-1027",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2021-26369",
"datePublished": "2022-05-12T17:07:32.274Z",
"dateReserved": "2021-01-29T00:00:00.000Z",
"dateUpdated": "2024-09-16T19:51:13.979Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-26369",
"date": "2026-05-14",
"epss": "0.00058",
"percentile": "0.17974"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-26369\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2022-05-12T18:16:53.257\",\"lastModified\":\"2024-11-21T05:56:13.677\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.\"},{\"lang\":\"es\",\"value\":\"Una UApp o ABL maliciosa o comprometida puede ser usada por un atacante para enviar una llamada al sistema malformada al cargador de arranque, resultando en accesos a memoria fuera de l\u00edmites\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE400A80-D9B1-4DB0-A279-D4B74FFC4F75\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1639FB-C5B9-4DC6-9758-43C628914D8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A394396F-CED4-4A52-ACA2-A0B74A1AE97E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE9915AD-D036-49FC-98AA-D2EEFEDF76A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B233FD6C-2F8A-4542-B353-3E7B6D77CD94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F810170-5792-4C69-9D0A-DC9422CB3D90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6678421F-CD05-445F-B114-293609732777\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61E04BD-4B95-4513-B832-30DF5332B77E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA61ADB-2FEA-459A-BF4F-C55401479107\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C5C135-D432-4AEC-BB40-01FDA6A6E995\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FF5F66-636C-4637-96F7-0FA45BB7C64B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B01772-B9AB-4724-BC36-C707E01C9EDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4F55EF-4F2B-499C-8173-12BE32085744\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA86063-6EE8-446E-BCE1-210B0699103B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B7FA81-11D0-4DC2-B81D-1BD48D341E6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C1A897-5FA2-403D-86C2-9D67C5B043A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1117C6B9-C87A-4185-A7DE-B4221BB59ABC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F962DD-90D5-47AB-8ABC-36E925821636\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98831A6B-A51F-48A9-80D7-B903A4F0A936\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1390DB-9E89-4C57-93F7-06B36EFDE579\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962E91F5-037B-4532-A5DB-FCC01631666F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D97A583-39ED-4B1C-B7D9-48F0F56294A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74236755-56DA-4245-A07F-DF9817D8F01D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E5F3921-FA39-4896-8546-DE603A70374A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BEE640-381F-449B-ACB1-F1BD255683C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6512668F-EEFB-4654-AE7F-9F71F89F3B65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC4BECA-6023-4225-9685-937E47C67C1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"031C2DA9-0E24-450C-B57A-DC7C519D5F47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D2C602-8086-4FC4-AE89-0842A453E56E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8198CED9-216C-4573-B766-B6CDB3E6F7CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D777E18-B7ED-42CF-A2C4-87426B04E8EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC21C1E-D4E7-424F-A284-BBE94194B43C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3EDC73-2517-4EBF-B160-85266304D866\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8650BE66-7694-4DD9-94E5-73A7DD0A124D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94AB5202-A5A2-479E-B4B0-347C823201AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D68B5B-0878-47BA-9DCC-BF2D793F92E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B07D45-5EA5-405E-A649-DADE2451E3EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72FC510-6F4C-4D04-BEA9-9DDE22617CEF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09342618-057F-4F49-A43F-352212738F80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5898533-4CDE-496C-99A8-361F8C8E5A85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5FDA44-978A-4ACC-9A42-00929DFE485B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8928F3EB-EE42-4ABB-A76D-619AFEA284B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD963142-F19B-42C9-AB46-8F24CD773BE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4DA33B2-B942-447F-9229-A41808411F38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D64E8F-BB90-4425-9980-9D2E2B74E83B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D4E46F-20BB-46BE-A36F-826E2A15E931\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FD86A5C-A9A9-4C84-91D9-54F2516E8487\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D9532A-0FA1-43E8-A2F7-B2436AF64189\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAED3E10-E29A-41E8-9758-C0DEEB13D630\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3C4424D-70E5-4101-B39C-15EEC4E933BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16BC515-84AE-432F-853B-822E737C242F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF14DD9D-3906-4E4F-804E-00B41525285C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F99F7EA-8CDF-45F5-9579-E902C3D02E7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1FF616-B7B9-41E1-9F16-86B24C5FA22C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C215E52-0E0C-42F5-9140-8313E847A2FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B75781D-051F-44C1-B79F-1C32AFECFF65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0D7F33C-F522-4A20-9055-1662178D7F27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78AB5531-B88E-478C-A723-ADAE3E0C87F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DBF39F8-2317-432A-846D-7FEC2C35EEE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2093BCDB-70F3-4D90-B899-B2801F8A6059\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F24782C-DBE2-488F-B935-49B4A8BC1E29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9825AB7C-7675-4364-BCE3-4C63BD41780A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"937E2FA2-BED8-48FF-8D01-153D4039F224\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6788A3F-6731-4529-AAFF-3CB893C0D07B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC56C52-6200-47CD-A722-28A1437050B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1449EC-F9D9-4846-A6E1-56F0B1EE8849\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13AB11C7-28F2-41AF-85D4-F391E02797A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC33A3B-F40D-4532-AA66-4E23360F94E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A09152-93D2-493D-8CE0-8A4F30F0DD39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"337E685C-4B65-441C-AD06-E8374CC39450\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBB31D3-58CA-44EE-B115-77D1D83D9E23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9669B2E-9590-4521-AC69-E7F5F201CAA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF398C51-EB53-4C3F-8D88-BD3931D9293F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53240910-3F88-465C-A0CD-A98395A05756\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED8BD87-468E-4953-96B1-CF923985B963\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F23104CA-40BB-497E-809E-B89BDBB8B844\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A468A5E6-BCFA-4141-955E-D7AFE1737913\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB09D697-326C-4902-BB5A-C5EAC9A2BD22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE64730D-B284-450E-9450-72AAEBAE2000\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD6028F-DD27-4D81-8E0A-06C2F1B9277C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9BDB04-877C-472D-A3BB-6C32FF269E00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808C582D-4F80-4378-B177-012EEF438443\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C00179A-620B-4DC7-893A-11AFAB9EE13C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1031085D-AD15-4124-803E-9B742E7484A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8308D5A2-0985-487C-B16C-4EEF835BDD4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27CDB416-B093-4871-8142-1D7EB5BF90B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C9FEEF-0D0F-40DC-9E98-248F8608B755\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A9F95C-E531-40FA-BCE7-3CEB6E26497B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3964CA7C-996C-43C5-B1A5-14046DAD07BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5454A72B-76EC-46D9-8675-97DC076D7615\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF7F277-B1E1-4C44-B122-91A7B7D299DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B5369B-DFFE-4A84-8894-513AE7FC7C6C\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
GSD-2021-26369
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2021-26369",
"description": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.",
"id": "GSD-2021-26369"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-26369"
],
"details": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.",
"id": "GSD-2021-26369",
"modified": "2023-12-13T01:23:33.209661Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
"ID": "CVE-2021-26369",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Ryzen\u2122 Series ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
},
{
"product_name": " Athlon\u2122 Series ",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "various"
}
]
}
}
]
},
"vendor_name": "AMD"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "tbd"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
"refsource": "MISC",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
]
},
"source": {
"advisory": "AMD-SB-1027 ",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@amd.com",
"ID": "CVE-2021-26369"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-06-01T21:13Z",
"publishedDate": "2022-05-12T18:16Z"
}
}
}
FKIE_CVE-2021-26369
Vulnerability from fkie_nvd - Published: 2022-05-12 18:16 - Updated: 2024-11-21 05:56
Severity ?
Summary
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:amd:radeon_software:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE400A80-D9B1-4DB0-A279-D4B74FFC4F75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6678421F-CD05-445F-B114-293609732777",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses."
},
{
"lang": "es",
"value": "Una UApp o ABL maliciosa o comprometida puede ser usada por un atacante para enviar una llamada al sistema malformada al cargador de arranque, resultando en accesos a memoria fuera de l\u00edmites"
}
],
"id": "CVE-2021-26369",
"lastModified": "2024-11-21T05:56:13.677",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-05-12T18:16:53.257",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2022-0073
Vulnerability from csaf_certbund - Published: 2022-05-10 22:00 - Updated: 2025-02-16 23:00Summary
AMD Prozessoren: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff: Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren.
Betroffene Betriebssysteme: - BIOS/Firmware
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Lenovo Computer
Lenovo
|
cpe:/o:lenovo:lenovo_computer:-
|
— | |
|
AMD Prozessor Epyc
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
Epyc | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
AMD Prozessor
AMD / Prozessor
|
cpe:/h:amd:amd_processor:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
HPE ProLiant
HPE
|
cpe:/h:hp:proliant:-
|
— |
References
28 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Prozessoren sind die zentralen Rechenwerke eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0073 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0073.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0073 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0073"
},
{
"category": "external",
"summary": "AMD Security Advisory vom 2022-05-10",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
},
{
"category": "external",
"summary": "AMD Security Advisory vom 2022-05-10",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
},
{
"category": "external",
"summary": "Lenovo Security Advisory vom 2022-05-10",
"url": "https://support.lenovo.com/us/en/product_security/LEN-87863"
},
{
"category": "external",
"summary": "HP Security Bulletin HPSBHF03792 vom 2022-05-12",
"url": "https://support.hp.com/us-en/document/ish_6189684-6189764-16/HPSBHF03792"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF04235 vom 2022-05-17",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04235en_us\u0026hprpt_id=ALERT_HPE_3023598\u0026jumpid=em_pom8nu6hj_aid-520066529"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-070 vom 2022-05-20",
"url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-070.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1751-1 vom 2022-05-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1847-1 vom 2022-05-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1840-1 vom 2022-05-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011156.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1846-1 vom 2022-05-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011160.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1923-1 vom 2022-06-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011226.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2022-1800 vom 2022-06-07",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1800.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-1606 vom 2022-07-07",
"url": "https://alas.aws.amazon.com/ALAS-2022-1606.html"
},
{
"category": "external",
"summary": "HPE Security Bulletin",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404"
},
{
"category": "external",
"summary": "AMD Security Bulletin",
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14775-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14796-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14777-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14800-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14770-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14776-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14797-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RLB6EQ4PQFULA6326VPRQRWW66T32SST/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14787-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14778-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14791-1 vom 2025-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14804-1 vom 2025-02-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/"
}
],
"source_lang": "en-US",
"title": "AMD Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-02-16T23:00:00.000+00:00",
"generator": {
"date": "2025-02-17T09:16:43.421+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2022-0073",
"initial_release_date": "2022-05-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-05-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-05-12T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2022-05-17T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HPE aufgenommen"
},
{
"date": "2022-05-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2022-05-26T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-02T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-07T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-07-07T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-01-22T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2023-04-02T22:00:00.000+00:00",
"number": "10",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2024-02-13T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von AMD aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Epyc",
"product": {
"name": "AMD Prozessor Epyc",
"product_id": "T020995",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:epyc"
}
}
},
{
"category": "product_version",
"name": "Ryzen",
"product": {
"name": "AMD Prozessor Ryzen",
"product_id": "T023180",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:ryzen"
}
}
},
{
"category": "product_version",
"name": "Athlon",
"product": {
"name": "AMD Prozessor Athlon",
"product_id": "T023181",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:athlon"
}
}
},
{
"category": "product_name",
"name": "AMD Prozessor",
"product": {
"name": "AMD Prozessor",
"product_id": "T029010",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:-"
}
}
}
],
"category": "product_name",
"name": "Prozessor"
}
],
"category": "vendor",
"name": "AMD"
},
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "HP Computer",
"product": {
"name": "HP Computer",
"product_id": "T023191",
"product_identification_helper": {
"cpe": "cpe:/h:hp:computer:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Lenovo Computer",
"product": {
"name": "Lenovo Computer",
"product_id": "T006520",
"product_identification_helper": {
"cpe": "cpe:/o:lenovo:lenovo_computer:-"
}
}
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12931",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12931"
},
{
"cve": "CVE-2020-12944",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12944"
},
{
"cve": "CVE-2020-12946",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12946"
},
{
"cve": "CVE-2020-12951",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2020-12951"
},
{
"cve": "CVE-2021-0153",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0153"
},
{
"cve": "CVE-2021-0154",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0154"
},
{
"cve": "CVE-2021-0155",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0155"
},
{
"cve": "CVE-2021-0159",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0159"
},
{
"cve": "CVE-2021-0188",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0188"
},
{
"cve": "CVE-2021-0189",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0189"
},
{
"cve": "CVE-2021-0190",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0190"
},
{
"cve": "CVE-2021-21131",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-21131"
},
{
"cve": "CVE-2021-21136",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-21136"
},
{
"cve": "CVE-2021-26312",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26312"
},
{
"cve": "CVE-2021-26317",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26317"
},
{
"cve": "CVE-2021-26335",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26335"
},
{
"cve": "CVE-2021-26336",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26336"
},
{
"cve": "CVE-2021-26337",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26337"
},
{
"cve": "CVE-2021-26339",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26339"
},
{
"cve": "CVE-2021-26342",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26342"
},
{
"cve": "CVE-2021-26347",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26347"
},
{
"cve": "CVE-2021-26348",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26348"
},
{
"cve": "CVE-2021-26349",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26349"
},
{
"cve": "CVE-2021-26350",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26350"
},
{
"cve": "CVE-2021-26351",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26351"
},
{
"cve": "CVE-2021-26352",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26352"
},
{
"cve": "CVE-2021-26361",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26361"
},
{
"cve": "CVE-2021-26362",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26362"
},
{
"cve": "CVE-2021-26363",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26363"
},
{
"cve": "CVE-2021-26364",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26364"
},
{
"cve": "CVE-2021-26366",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26366"
},
{
"cve": "CVE-2021-26368",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26368"
},
{
"cve": "CVE-2021-26369",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26369"
},
{
"cve": "CVE-2021-26372",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26372"
},
{
"cve": "CVE-2021-26373",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26373"
},
{
"cve": "CVE-2021-26375",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26375"
},
{
"cve": "CVE-2021-26376",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26376"
},
{
"cve": "CVE-2021-26378",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26378"
},
{
"cve": "CVE-2021-26384",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26384"
},
{
"cve": "CVE-2021-26386",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26386"
},
{
"cve": "CVE-2021-26388",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26388"
},
{
"cve": "CVE-2021-26390",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-26390"
},
{
"cve": "CVE-2021-33103",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33103"
},
{
"cve": "CVE-2021-33117",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33117"
},
{
"cve": "CVE-2021-33122",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33122"
},
{
"cve": "CVE-2021-33123",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33123"
},
{
"cve": "CVE-2021-33124",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-33124"
},
{
"cve": "CVE-2021-39298",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2021-39298"
},
{
"cve": "CVE-2022-0005",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2022-0005"
},
{
"cve": "CVE-2022-21151",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2022-21151"
},
{
"cve": "CVE-2023-20558",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2023-20558"
},
{
"cve": "CVE-2023-20559",
"product_status": {
"known_affected": [
"T006520",
"T020995",
"T023180",
"T023191",
"T023181",
"T029010",
"T002207",
"T027843",
"398363",
"T009310"
]
},
"release_date": "2022-05-10T22:00:00.000+00:00",
"title": "CVE-2023-20559"
}
]
}
GHSA-XX44-254W-M8VR
Vulnerability from github – Published: 2022-05-13 00:00 – Updated: 2022-06-02 00:00
VLAI?
Details
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
Severity ?
7.8 (High)
{
"affected": [],
"aliases": [
"CVE-2021-26369"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-05-12T18:16:00Z",
"severity": "HIGH"
},
"details": "A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.",
"id": "GHSA-xx44-254w-m8vr",
"modified": "2022-06-02T00:00:14Z",
"published": "2022-05-13T00:00:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26369"
},
{
"type": "WEB",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…