Advanced Micro Devices (AMD) Ryzen 3 5300g Firmware Comboam4v2 1.2.0.b

CPE Details

Advanced Micro Devices (AMD) Ryzen 3 5300g Firmware Comboam4v2 1.2.0.b
comboam4v2_1.2.0.b
2023-11-24
12h47 +00:00
2023-11-24
12h47 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:amd:ryzen_3_5300g_firmware:comboam4v2_1.2.0.b:*:*:*:*:*:*:*

Informations

Vendor

amd

Product

ryzen_3_5300g_firmware

Version

comboam4v2_1.2.0.b

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-26367 2024-08-13 16h50 +00:00 A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
6
Medium
CVE-2023-20579 2024-02-13 19h32 +00:00 Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.
6
Medium
CVE-2021-46758 2023-11-14 18h54 +00:00 Insufficient validation of SPI flash addresses in the ASP (AMD Secure Processor) bootloader may allow an attacker to read data in memory mapped beyond SPI flash resulting in a potential loss of availability and integrity.
6.1
Medium
CVE-2023-20555 2023-08-08 17h07 +00:00 Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.
7.8
High
CVE-2023-20569 2023-08-08 17h02 +00:00 A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
4.7
Medium