Advanced Micro Devices (AMD) Ryzen 5600

CPE Details

Advanced Micro Devices (AMD) Ryzen 5600
-
2023-05-17
20h19 +00:00
2023-06-20
11h49 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*

Informations

Vendor

amd

Product

ryzen_5600

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-20597 2023-09-20 17h32 +00:00 Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
5.5
Medium
CVE-2023-20594 2023-09-20 17h27 +00:00 Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
4.4
Medium
CVE-2023-20583 2023-08-01 18h00 +00:00 A potential power side-channel vulnerability in AMD processors may allow an authenticated attacker to monitor the CPU power consumption as the data in a cache line changes over time potentially resulting in a leak of sensitive information.
4.7
Medium
CVE-2021-46794 2023-05-09 19h01 +00:00 Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.
7.5
High
CVE-2021-46792 2023-05-09 19h01 +00:00 Time-of-check Time-of-use (TOCTOU) in the BIOS2PSP command may allow an attacker with a malicious BIOS to create a race condition causing the ASP bootloader to perform out-of-bounds SRAM reads upon an S3 resume event potentially leading to a denial of service.
5.9
Medium
CVE-2021-46773 2023-05-09 19h01 +00:00 Insufficient input validation in ABL may enable a privileged attacker to corrupt ASP memory, potentially resulting in a loss of integrity or code execution.
8.8
High
CVE-2021-46765 2023-05-09 19h01 +00:00 Insufficient input validation in ASP may allow an attacker with a compromised SMM to induce out-of-bounds memory reads within the ASP, potentially leading to a denial of service.
7.5
High
CVE-2021-46759 2023-05-09 19h00 +00:00 Improper syscall input validation in AMD TEE (Trusted Execution Environment) may allow an attacker with physical access and control of a Uapp that runs under the bootloader to reveal the contents of the ASP (AMD Secure Processor) bootloader accessible memory to a serial port, resulting in a potential loss of integrity.
6.1
Medium
CVE-2021-46755 2023-05-09 19h00 +00:00 Failure to unmap certain SysHub mappings in error paths of the ASP (AMD Secure Processor) bootloader may allow an attacker with a malicious bootloader to exhaust the SysHub resources resulting in a potential denial of service.
7.5
High
CVE-2021-46754 2023-05-09 19h00 +00:00 Insufficient input validation in the ASP (AMD Secure Processor) bootloader may allow an attacker with a compromised Uapp or ABL to coerce the bootloader into exposing sensitive information to the SMU (System Management Unit) resulting in a potential loss of confidentiality and integrity.
9.1
Critical
CVE-2021-46753 2023-05-09 19h00 +00:00 Failure to validate the length fields of the ASP (AMD Secure Processor) sensor fusion hub headers may allow an attacker with a malicious Uapp or ABL to map the ASP sensor fusion hub region and overwrite data structures leading to a potential loss of confidentiality and integrity.
9.1
Critical
CVE-2021-46749 2023-05-09 18h59 +00:00 Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.
7.5
High