Advanced Micro Devices (AMD) AMD 3015E Firmware

CPE Details

Advanced Micro Devices (AMD) AMD 3015E Firmware
-
2022-11-22
16h22 +00:00
2022-11-22
17h35 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:amd:amd_3015e_firmware:-:*:*:*:*:*:*:*

Informations

Vendor

amd

Product

amd_3015e_firmware

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-20521 2023-11-14 18h52 +00:00 TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
5.7
Medium
CVE-2021-26371 2023-05-09 18h59 +00:00 A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.
5.5
Medium
CVE-2021-26365 2023-05-09 18h58 +00:00 Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents.
8.2
High
CVE-2021-26354 2023-05-09 18h58 +00:00 Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity.
5.5
Medium
CVE-2021-26392 2022-11-09 20h44 +00:00 Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
7.8
High
CVE-2020-12930 2022-11-09 20h44 +00:00 Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
7.8
High
CVE-2021-26393 2022-11-09 20h44 +00:00 Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
5.5
Medium
CVE-2020-12931 2022-11-09 20h44 +00:00 Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
7.8
High