Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-23815 (GCVE-0-2022-23815)
Vulnerability from cvelistv5 – Published: 2024-08-13 16:51 – Updated: 2025-03-18 20:42
VLAI?
EPSS
Summary
Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.
Severity ?
7.5 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://www.amd.com/en/resources/product-security… | vendor-advisory |
Impacted products
7 products
| Vendor | Product | Version | |
|---|---|---|---|
| AMD | AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics |
Affected:
various
(PI)
|
|
| AMD | AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics |
Unaffected:
PicassoPI-FP5 1.0.0.F
|
|
| AMD | AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics |
Unaffected:
PollockPI-FT5 1.0.0.5
|
|
| AMD | AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics |
Unaffected:
PicassoPI-FP5 1.0.0.E
|
|
| AMD | AMD RyzenTM Embedded R1000 |
Unaffected:
EmbeddedPI-FP5 1.2.0.A
|
|
| AMD | AMD RyzenTM Embedded R2000 |
Unaffected:
EmbeddedR2KPI-FP5 1.0.0.2
|
|
| AMD | AMD RyzenTM Embedded V1000 |
Unaffected:
EmbeddedPI-FP5 1.2.0.A
|
Date Public ?
2024-08-13 16:00
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "athlon_3000g",
"vendor": "amd",
"versions": [
{
"status": "affected",
"version": "various"
},
{
"status": "unaffected",
"version": "1.0.0.F"
},
{
"status": "unaffected",
"version": "1.0.0.5"
},
{
"status": "unaffected",
"version": "1.0.0.E"
}
]
},
{
"cpes": [
"cpe:2.3:a:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ryzen_embedded_r1000",
"vendor": "amd",
"versions": [
{
"status": "unaffected",
"version": "1.2.0.A"
}
]
},
{
"cpes": [
"cpe:2.3:a:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ryzen_embedded_r2000",
"vendor": "amd",
"versions": [
{
"status": "unaffected",
"version": "1.0.0.2"
}
]
},
{
"cpes": [
"cpe:2.3:a:amd:ryzen_embedded_v1000:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ryzen_embedded_v1000",
"vendor": "amd",
"versions": [
{
"status": "unaffected",
"version": "1.2.0.A"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-23815",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-19T17:04:47.953819Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T20:42:11.741Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various",
"versionType": "PI"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "PicassoPI-FP5 1.0.0.F"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "PollockPI-FT5 1.0.0.5"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "PicassoPI-FP5 1.0.0.E"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD RyzenTM Embedded R1000",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "EmbeddedPI-FP5 1.2.0.A"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD RyzenTM Embedded R2000",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "EmbeddedR2KPI-FP5 1.0.0.2"
}
]
},
{
"defaultStatus": "affected",
"product": "AMD RyzenTM Embedded V1000",
"vendor": "AMD",
"versions": [
{
"status": "unaffected",
"version": "EmbeddedPI-FP5 1.2.0.A"
}
]
}
],
"datePublic": "2024-08-13T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e"
}
],
"value": "Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-13T16:51:43.735Z",
"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"shortName": "AMD"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
}
],
"source": {
"advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
"assignerShortName": "AMD",
"cveId": "CVE-2022-23815",
"datePublished": "2024-08-13T16:51:43.735Z",
"dateReserved": "2022-01-21T17:14:12.301Z",
"dateUpdated": "2025-03-18T20:42:11.741Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-23815",
"date": "2026-05-17",
"epss": "0.00083",
"percentile": "0.24023"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-23815\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2024-08-13T17:15:18.197\",\"lastModified\":\"2025-03-18T21:15:23.087\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Una verificaci\u00f3n de los l\u00edmites inadecuada en el firmware APCB puede permitir que un atacante realice una escritura fuera de los l\u00edmites, corrompiendo la entrada APCB y potencialmente llevando a la ejecuci\u00f3n de c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@amd.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"03194384-10A2-4B6D-BED1-C01908249969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF28BE-F049-4716-AADE-643FABB753A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E11A9D-03EC-4014-BB1C-5286C694581B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"228E3FBD-F997-402D-AE96-B14D66390700\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"1D532BCD-50E7-41AC-91D3-A0135F2266EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE1C3A6-06F5-4448-B7BE-54EED3672BBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"6CC0AC2E-CA16-46E5-A703-8DCD3EF82425\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"3770F180-FB7C-410F-B49D-D30AA05326BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2EC993-8A65-416B-939F-1C707D596AF9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"15FE9FAE-DEC6-42FA-8622-3D5B0C845928\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C6F103-30CC-4738-B489-B12790836B1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"E25EF8F6-B5F3-478C-9AB5-60B29497D2F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCDAE070-C41A-4D8C-BE0D-DBD434760749\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9921AE2D-F497-47C8-B463-947E230CF4F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"FD8FA542-D8A5-4C7F-BF80-E79CE90D7D76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C29793-1142-4506-8C32-3B89227BB3A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"picassopi-fp5_1.0.0.e\",\"matchCriteriaId\":\"F6F0F843-A668-4BA3-9111-491BD115E0DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8921CB70-EE2E-4E18-8E6C-52B505E2D2E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"420E8314-35B8-4A12-AD42-3914EBA51D4D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0FB0AF-E942-4257-A9F2-8077A753A169\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD375C2E-B976-4DAE-BF89-EFED1482DB28\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE68ECE-5298-4BC1-AC24-5CF613389CDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D689C088-F1F1-4368-B6AE-75D3F9582FB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09DC414-96EE-478E-847C-7ACB5915659B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52DFA8C8-AD16-45B1-934F-AEE78C51DDAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F521757-7ABC-4CEB-AD06-2FD738216E8E\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-23815\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-19T17:04:47.953819Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"athlon_3000g\", \"versions\": [{\"status\": \"affected\", \"version\": \"various\"}, {\"status\": \"unaffected\", \"version\": \"1.0.0.F\"}, {\"status\": \"unaffected\", \"version\": \"1.0.0.5\"}, {\"status\": \"unaffected\", \"version\": \"1.0.0.E\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_embedded_r1000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1.2.0.A\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_embedded_r2000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1.0.0.2\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:amd:ryzen_embedded_v1000:*:*:*:*:*:*:*:*\"], \"vendor\": \"amd\", \"product\": \"ryzen_embedded_v1000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1.2.0.A\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-19T17:08:55.731Z\"}}], \"cna\": {\"source\": {\"advisory\": \"AMD-SB-4002, AMD-SB-3002, AMD-SB-5001\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"AMD\", \"product\": \"AMD Athlon\\u2122 3000 Series Desktop Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"affected\", \"version\": \"various\", \"versionType\": \"PI\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Athlon\\u2122 3000 Series Mobile Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"PicassoPI-FP5 1.0.0.F\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Athlon\\u2122 3000 Series Mobile Processors with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"PollockPI-FT5 1.0.0.5\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD Ryzen\\u2122 3000 Series Mobile Processor with Radeon\\u2122 Graphics\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"PicassoPI-FP5 1.0.0.E\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD RyzenTM Embedded R1000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"EmbeddedPI-FP5 1.2.0.A\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD RyzenTM Embedded R2000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"EmbeddedR2KPI-FP5 1.0.0.2\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"AMD\", \"product\": \"AMD RyzenTM Embedded V1000\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"EmbeddedPI-FP5 1.2.0.A\"}], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2024-08-13T16:00:00.000Z\", \"references\": [{\"url\": \"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eImproper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.\u003cbr\u003e\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\\n\\n\u003c/div\u003e\\n\\n\u003c/div\u003e\\n\\n\u003c/div\u003e\\n\\n\\n\\n\\n\\n\u003c/span\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"shortName\": \"AMD\", \"dateUpdated\": \"2024-08-13T16:51:43.735Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-23815\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-18T20:42:11.741Z\", \"dateReserved\": \"2022-01-21T17:14:12.301Z\", \"assignerOrgId\": \"b58fc414-a1e4-4f92-9d70-1add41838648\", \"datePublished\": \"2024-08-13T16:51:43.735Z\", \"assignerShortName\": \"AMD\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
BDU:2025-09857
Vulnerability from fstec - Published: 13.08.2024
VLAI Severity ?
Title
Уязвимость в прошивке APCB микропрограммного обеспечения графических процессоров AMD, связанная с записью за границами буфера, позволяющая нарушителю выполнить произвольный код
Description
Уязвимость в прошивке APCB микропрограммного обеспечения графических процессоров AMD связана с записью за границами буфера. Эксплуатация уязвимости может позволить нарушителю выполнить произвольный код
Severity ?
Vendor
ООО «Ред Софт», Advanced Micro Devices Inc.
Software Name
РЕД ОС (запись в едином реестре российских программ №3751), AMD Ryzen 3000 Series Mobile processor with Radeon graphics, AMD Athlon 3000 Series Mobile processors with Radeon graphics, AMD Athlon 3000 Series Desktop Processors with Radeon Graphics
Software Version
7.3 (РЕД ОС), до PicassoPI-FP5 1.0.0.F (AMD Ryzen 3000 Series Mobile processor with Radeon graphics), до PicassoPI-FP5 1.0.0.E (AMD Athlon 3000 Series Mobile processors with Radeon graphics), до PollockPI-FT5 1.0.0.5 (AMD Athlon 3000 Series Mobile processors with Radeon graphics), до ComboAM4PI 1.0.0.9 (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics), до ComboAM4v2 1.2.0.8 (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics)
Possible Mitigations
Использование рекомендаций:
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html
Для РедОС:
https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-13082025/?sphrase_id=1203948
Reference
https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-13082025/?sphrase_id=1203948
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html
CWE
CWE-787
{
"CVSS 2.0": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, Advanced Micro Devices Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.3 (\u0420\u0415\u0414 \u041e\u0421), \u0434\u043e PicassoPI-FP5 1.0.0.F (AMD Ryzen 3000 Series Mobile processor with Radeon graphics), \u0434\u043e PicassoPI-FP5 1.0.0.E (AMD Athlon 3000 Series Mobile processors with Radeon graphics), \u0434\u043e PollockPI-FT5 1.0.0.5 (AMD Athlon 3000 Series Mobile processors with Radeon graphics), \u0434\u043e ComboAM4PI 1.0.0.9 (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics), \u0434\u043e ComboAM4v2 1.2.0.8 (AMD Athlon 3000 Series Desktop Processors with Radeon Graphics)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: \nhttps://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-13082025/?sphrase_id=1203948",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "13.08.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-09857",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-23815",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), AMD Ryzen 3000 Series Mobile processor with Radeon graphics, AMD Athlon 3000 Series Mobile processors with Radeon graphics, AMD Athlon 3000 Series Desktop Processors with Radeon Graphics",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0435 APCB \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 AMD, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0437\u0430\u043f\u0438\u0441\u044c\u044e \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0417\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-787)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0435 APCB \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 AMD \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0437\u0430\u043f\u0438\u0441\u044c\u044e \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-linux-firmware-13082025/?sphrase_id=1203948\nhttps://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-787",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,2)"
}
GHSA-CJJQ-CWPW-FX4Q
Vulnerability from github – Published: 2024-08-13 18:31 – Updated: 2024-08-13 18:31
VLAI?
Details
Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2022-23815"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-08-13T17:15:18Z",
"severity": "HIGH"
},
"details": "Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.",
"id": "GHSA-cjjq-cwpw-fx4q",
"modified": "2024-08-13T18:31:15Z",
"published": "2024-08-13T18:31:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23815"
},
{
"type": "WEB",
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2024-1837
Vulnerability from csaf_certbund - Published: 2024-08-13 22:00 - Updated: 2025-08-18 22:00Summary
AMD Prozessoren: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Prozessoren sind die zentralen Rechenwerke eines Computers.
Radeon bezeichnet eine Familie von Grafikkarten von AMD.
Angriff: Ein Angreifer kann mehrere Schwachstellen in AMD Prozessor und AMD Radeon ausnutzen, um beliebigen Programmcode auszuführen, erhöhte Rechte zu erlangen, einen Denial-of-Service-Zustand zu erzeugen, Daten zu manipulieren, Sicherheitsmaßnahmen zu umgehen und vertrauliche Informationen preiszugeben.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
- Windows
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
Affected products
Known affected
10 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
HP Computer
HP
|
cpe:/h:hp:computer:-
|
— | |
|
AMD Prozessor Ryzen
AMD / Prozessor
|
cpe:/h:amd:amd_processor:ryzen
|
Ryzen | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
AMD Prozessor Athlon
AMD / Prozessor
|
cpe:/h:amd:amd_processor:athlon
|
Athlon | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Dell Computer
Dell
|
cpe:/o:dell:dell_computer:-
|
— | |
|
AMD Prozessor EPYC
AMD / Prozessor
|
cpe:/h:amd:amd_processor:epyc
|
EPYC | |
|
AMD Radeon
AMD
|
cpe:/h:amd:radeon:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
IBM Power Hardware Management Console v10
IBM / Power Hardware Management Console
|
cpe:/a:ibm:hardware_management_console:v10
|
v10 |
References
17 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Prozessoren sind die zentralen Rechenwerke eines Computers.\r\nRadeon bezeichnet eine Familie von Grafikkarten von AMD.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in AMD Prozessor und AMD Radeon ausnutzen, um beliebigen Programmcode auszuf\u00fchren, erh\u00f6hte Rechte zu erlangen, einen Denial-of-Service-Zustand zu erzeugen, Daten zu manipulieren, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen preiszugeben.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1837 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1837.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1837 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1837"
},
{
"category": "external",
"summary": "AMD Security Bulletin vom 2024-08-13",
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html"
},
{
"category": "external",
"summary": "AMD Security Bulletin vom 2024-08-13",
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
},
{
"category": "external",
"summary": "AMD Security Bulletin vom 2024-08-13",
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5002.html"
},
{
"category": "external",
"summary": "AMD Security Bulletin vom 2024-08-13",
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6013.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPSBHF03964 vom 2024-08-08",
"url": "https://support.hp.com/de-de/document/ish_11024058-11038843-16/HPSBHF03964"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7418 vom 2024-10-01",
"url": "https://access.redhat.com/errata/RHSA-2024:7418"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7482 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7482"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7481 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7481"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7483 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7483"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7484 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7484"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12797 vom 2024-10-23",
"url": "https://linux.oracle.com/errata/ELSA-2024-12797.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-307 vom 2024-12-03",
"url": "https://www.dell.com/support/kbdoc/de-de/000256080/dsa-2024-307-security-update-for-dell-amd-based-gpu-vulnerabilities"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7183573 vom 2025-02-18",
"url": "https://www.ibm.com/support/pages/node/7183573"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7561-1 vom 2025-06-09",
"url": "https://ubuntu.com/security/notices/USN-7561-1"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-051 vom 2025-08-18",
"url": "https://www.dell.com/support/kbdoc/de-de/000221360/dsa-2024-051"
}
],
"source_lang": "en-US",
"title": "AMD Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-18T22:00:00.000+00:00",
"generator": {
"date": "2025-08-19T06:11:00.264+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1837",
"initial_release_date": "2024-08-13T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-08-20T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von HP aufgenommen"
},
{
"date": "2024-09-30T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-01T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von IBM und IBM-APAR aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "EPYC",
"product": {
"name": "AMD Prozessor EPYC",
"product_id": "T036862",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:epyc"
}
}
},
{
"category": "product_version",
"name": "Ryzen",
"product": {
"name": "AMD Prozessor Ryzen",
"product_id": "T036865",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:ryzen"
}
}
},
{
"category": "product_version",
"name": "Athlon",
"product": {
"name": "AMD Prozessor Athlon",
"product_id": "T036866",
"product_identification_helper": {
"cpe": "cpe:/h:amd:amd_processor:athlon"
}
}
}
],
"category": "product_name",
"name": "Prozessor"
},
{
"category": "product_name",
"name": "AMD Radeon",
"product": {
"name": "AMD Radeon",
"product_id": "T036864",
"product_identification_helper": {
"cpe": "cpe:/h:amd:radeon:-"
}
}
}
],
"category": "vendor",
"name": "AMD"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T036868",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "HP Computer",
"product": {
"name": "HP Computer",
"product_id": "T032786",
"product_identification_helper": {
"cpe": "cpe:/h:hp:computer:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v10",
"product": {
"name": "IBM Power Hardware Management Console v10",
"product_id": "T023373",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:v10"
}
}
}
],
"category": "product_name",
"name": "Power Hardware Management Console"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-26344",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2021-26344"
},
{
"cve": "CVE-2023-20578",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2023-20578"
},
{
"cve": "CVE-2023-20591",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2023-20591"
},
{
"cve": "CVE-2021-26367",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2021-26367"
},
{
"cve": "CVE-2021-26387",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2021-26387"
},
{
"cve": "CVE-2023-31356",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2023-31356"
},
{
"cve": "CVE-2023-20518",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2023-20518"
},
{
"cve": "CVE-2024-21969",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2024-21969"
},
{
"cve": "CVE-2024-21981",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2024-21981"
},
{
"cve": "CVE-2023-20584",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2023-20584"
},
{
"cve": "CVE-2021-46746",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2021-46746"
},
{
"cve": "CVE-2021-46772",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2021-46772"
},
{
"cve": "CVE-2022-23815",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2022-23815"
},
{
"cve": "CVE-2022-23817",
"product_status": {
"known_affected": [
"T032786",
"T036865",
"67646",
"T036866",
"T000126",
"T036868",
"T036862",
"T036864",
"T004914",
"T023373"
]
},
"release_date": "2024-08-13T22:00:00.000+00:00",
"title": "CVE-2022-23817"
}
]
}
GSD-2022-23815
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-23815",
"id": "GSD-2022-23815"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-23815"
],
"id": "GSD-2022-23815",
"modified": "2023-12-13T01:19:35.004605Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2022-23815",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
FKIE_CVE-2022-23815
Vulnerability from fkie_nvd - Published: 2024-08-13 17:15 - Updated: 2025-03-18 21:15
Severity ?
7.5 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_silver_3050u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03194384-10A2-4B6D-BED1-C01908249969",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5752E4C7-FB24-4E31-ABB0-EB9F09AEECCC",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56FC4E22-6DCE-4DF0-A30E-B7574BE36FD6",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "235E9B6E-4C2F-4C97-8E56-4ECD4B9D1969",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_pro_3700u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D532BCD-50E7-41AC-91D3-A0135F2266EE",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_pro_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE1C3A6-06F5-4448-B7BE-54EED3672BBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC0AC2E-CA16-46E5-A703-8DCD3EF82425",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3770F180-FB7C-410F-B49D-D30AA05326BC",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15FE9FAE-DEC6-42FA-8622-3D5B0C845928",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E25EF8F6-B5F3-478C-9AB5-60B29497D2F7",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C5BE3C-6F3F-45A3-9F5C-A72CE30B3656",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD8FA542-D8A5-4C7F-BF80-E79CE90D7D76",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F0F843-A668-4BA3-9111-491BD115E0DA",
"versionEndExcluding": "picassopi-fp5_1.0.0.e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "420E8314-35B8-4A12-AD42-3914EBA51D4D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD375C2E-B976-4DAE-BF89-EFED1482DB28",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D689C088-F1F1-4368-B6AE-75D3F9582FB1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52DFA8C8-AD16-45B1-934F-AEE78C51DDAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution."
},
{
"lang": "es",
"value": "Una verificaci\u00f3n de los l\u00edmites inadecuada en el firmware APCB puede permitir que un atacante realice una escritura fuera de los l\u00edmites, corrompiendo la entrada APCB y potencialmente llevando a la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"id": "CVE-2022-23815",
"lastModified": "2025-03-18T21:15:23.087",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0,
"source": "psirt@amd.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-08-13T17:15:18.197",
"references": [
{
"source": "psirt@amd.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4004.html"
}
],
"sourceIdentifier": "psirt@amd.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…