cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-20596,https://securityvulnerability.io/vulnerability/CVE-2023-20596,Improper Input Validation in AMD Products May Lead to Arbitrary Code Execution,"An improper input validation issue within the SMM Supervisor component may allow an attacker with a compromised SMI handler to gain Ring0 access. This elevated access level can potentially lead to arbitrary code execution within the system, posing significant risks to overall system integrity and security. Users and administrators should remain vigilant and apply the latest security updates to mitigate this vulnerability.",AMD,"Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics Formerly codenamed “Cezanne” AM4,Ryzen™ 7000 Series Desktop Processors with Radeon™ Graphics Formerly codenamed “Raphael”,Ryzen™ 7000 Series Desktop Processors with Radeon™ Graphics Formerly codenamed “Raphael” X3D,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”,AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics ""Rembrandt"",AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”,Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics Formerly codenamed “Phoenix”",9.8,CRITICAL,0.0024900001008063555,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2023-20565,https://securityvulnerability.io/vulnerability/CVE-2023-20565,Insufficient Protections in SMM Code in AMD Products,"The identified vulnerability arises from inadequate protections within the System Management Mode (SMM) code utilized by AMD products. This security flaw could potentially be exploited by attackers with local access, enabling them to elevate their privileges on the affected system. It is crucial for users and administrators to be aware of this issue and to follow best practices for securing their environments against possible exploitation.",AMD,"Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”,Ryzen™ 7000 Series Desktop Processors “Raphael” XD3,AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics ""Rembrandt"",AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”,AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics “Barcelo”,AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”, Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics “Phoenix” FP7/FP7r2/FP8,AMD Ryzen™ Embedded V3000",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2023-20571,https://securityvulnerability.io/vulnerability/CVE-2023-20571,Race Condition Vulnerability in System Management Mode Affecting AMD Products,"A race condition vulnerability exists in the System Management Mode (SMM) code of various AMD processors. An attacker with access to a compromised user space can exploit this vulnerability in conjunction with CVE-2018-8897, potentially leading to privilege escalation. This may allow the attacker to gain higher access levels within the system, making it crucial for users to apply the necessary security updates to mitigate the risks associated with this vulnerability.",AMD,"Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”,Ryzen™ 7000 Series Desktop Processors “Raphael” XD3,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”,AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics ""Rembrandt"",AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”,AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics “Barcelo”,AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”, Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics “Phoenix” FP7/FP7r2/FP8",8.1,HIGH,0.0017000000225380063,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2023-20563,https://securityvulnerability.io/vulnerability/CVE-2023-20563,Insufficient Protections in System Management Mode Affects AMD Products,"The identified vulnerability arises from inadequate security measures in the System Management Mode (SMM) code of AMD processors. This oversight may permit attackers with local access to escalate their privileges, potentially compromising system integrity. To mitigate risks, users are advised to apply the latest patches and follow guidelines provided by AMD to enhance their security posture against such exploitation.",Amd,"Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Ryzen™ 7000 Series Desktop Processors “raphael” Xd3,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics ""rembrandt"",Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics “rembrandt-r”,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics “barcelo”,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”,Ryzen™ 7040 Series Mobile Processors With Radeon™ Graphics “phoenix” Fp7/fp7r2/fp8,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded V3000",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2022-23821,https://securityvulnerability.io/vulnerability/CVE-2022-23821,Improper Access Control Vulnerability in AMD System Management Mode,"This vulnerability involves improper access control within System Management Mode (SMM), which may permit an attacker to write to the Serial Peripheral Interface (SPI) ROM. Exploitation of this vulnerability could potentially lead to arbitrary code execution, posing significant security risks to affected systems. It is crucial for users and administrators of AMD platforms to be aware of this issue and implement necessary security measures to safeguard their environments.",Amd,"Ryzen™ 3000 Series Desktop Processors “matisse”,Ryzen™ 5000 Series Desktop Processors “vermeer”,Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics “picasso” Am4,Ryzen™ Threadripper™ 2000 Series Processors “colfax”,Ryzen™ Threadripper™ 3000 Series Processors “castle Peak” Hedt,Ryzen™ Threadripper™ Pro Processors “castle Peak” Ws Sp3,Ryzen™ Threadripper™ Pro 3000wx Series Processors “chagall” Ws,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “dali”/”dali” Fp5,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “pollock”,Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics “picasso” Fp5,Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics “renoir” Fp6,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics ""rembrandt"",Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics “rembrandt-r”,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics “barcelo”,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded V1000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",9.8,CRITICAL,0.0028200000524520874,false,false,false,false,,false,false,2023-11-14T18:54:32.952Z,0 CVE-2021-46758,https://securityvulnerability.io/vulnerability/CVE-2021-46758,,"Insufficient validation of SPI flash addresses in the ASP (AMD Secure Processor) bootloader may allow an attacker to read data in memory mapped beyond SPI flash resulting in a potential loss of availability and integrity. ",Amd,"Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Ryzen™ 7000 Series Desktop Processors “raphael” Xd3,Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics “renoir” Fp6,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics ""rembrandt"",Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics “rembrandt-r”,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics “barcelo”,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”",6.1,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2023-11-14T18:54:25.467Z,0 CVE-2022-23820,https://securityvulnerability.io/vulnerability/CVE-2022-23820,Buffer Validation Flaw in AMD Products,"A buffer validation flaw in AMD's SMM communication buffer poses a security risk by allowing potential attackers to corrupt the SMRAM. This vulnerability enables the possibility of executing arbitrary code, which can lead to unauthorized access and manipulation of the system. To mitigate this risk, users are advised to apply the latest security patches from AMD.",Amd,"Ryzen™ 3000 Series Desktop Processors “matisse"",Amd Ryzen™ 5000 Series Desktop Processors “vermeer”,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics “picasso” Am4,Amd Ryzen™ Threadripper™ 2000 Series Processors “colfax”,Amd Ryzen™ Threadripper™ 3000 Series Processors “castle Peak” Hedt,Amd Ryzen™ Threadripper™ Pro Processors “castle Peak” Ws Sp3,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors “chagall” Ws,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “pollock”,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics “picasso” Fp5,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics “renoir” Fp6,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics ""rembrandt"",Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics “rembrandt-r”,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics “barcelo”,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”,3rd Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 7003",7.5,HIGH,0.002240000059828162,false,false,false,false,,false,false,2023-11-14T18:52:21.457Z,0 CVE-2023-20597,https://securityvulnerability.io/vulnerability/CVE-2023-20597,," Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access. ",Amd,"Ryzen™ 3000 Series Desktop Processors “matisse”,Ryzen™ 5000 Series Desktop Processors “vermeer”,Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Ryzen™ Threadripper™ 3000 Series Processors “castle Peak” Hedt,Ryzen™ Threadripper™ Pro Processors “castle Peak” Ws Sp3,Ryzen™ Threadripper™ Pro 3000wx Series Processors “chagall” Ws Sp3,Ryzen™ 6000 Series Mobile Processors With Radeon™ Graphics ""rembrandt"",Ryzen™ 7035 Series Mobile Processors With Radeon™ Graphics ""rembrandt-r"",Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics ""barcelo"",Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”",5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2023-09-20T18:15:00.000Z,0 CVE-2023-20594,https://securityvulnerability.io/vulnerability/CVE-2023-20594,," Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access. ",AMD,"Ryzen™ 3000 Series Desktop Processors “Matisse”,Ryzen™ 5000 Series Desktop Processors “Vermeer” ,Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” ,Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4,Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT,Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3,Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS SP3,Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” ,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”,Ryzen™ 6000 Series Mobile Processors with Radeon™ Graphics ""Rembrandt"",Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics ""Rembrandt-R"",Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics ""Barcelo"",Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R” ,3rd Gen AMD EPYC™ Processors",4.4,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2023-09-20T18:15:00.000Z,0 CVE-2023-20555,https://securityvulnerability.io/vulnerability/CVE-2023-20555,Insufficient Input Validation in CpmDisplayFeatureSmm of AMD Products,"A vulnerability exists in the CpmDisplayFeatureSmm component of AMD products, stemming from insufficient input validation. This flaw could allow attackers to manipulate SMM (System Management Mode) memory by overwriting an arbitrary bit in a pointer that they control. Exploiting this vulnerability could lead to unauthorized code execution within the protected SMM environment, potentially compromising the integrity and confidentiality of the system.",Amd,"Ryzen™ 3000 Series Desktop Processors “matisse” Am4,Ryzen™ 5000 Series Desktop Processors “vermeer” Am4,Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne” Am4,Ryzen™ 7000 Series Processors “raphael”,Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics “picasso”,Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics “renoir” Fp5,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “dali”/”dali” Fp5,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “pollock”,Ryzen™ 3000 Series Mobile Processors With Radeon™ Graphics “picasso”,Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics “renoir” Fp6,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Ryzen™ 6000 Series Mobile Processors ""rembrandt"",Ryzen™ 7030 Series Mobile Processors “barcelo”,Ryzen™ 7020 Series Mobile Processors “mendocino”",7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2023-08-08T18:15:00.000Z,0 CVE-2021-46765,https://securityvulnerability.io/vulnerability/CVE-2021-46765,Insufficient Input Validation in AMD's ASP Product,"A vulnerability exists in AMD's ASP due to insufficient input validation that may allow an attacker with a compromised System Management Mode (SMM) to exploit the system. This can result in out-of-bounds memory reads, which could disrupt normal operations and lead to a denial of service, thereby compromising system stability and security.",Amd,"Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne” Am4,Ryzen™ 3000 Series Mobile Processors With Radeon™ Graphics “renoir”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Ryzen™ 6000 Series Mobile Processors ""rembrandt""",7.5,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2023-05-09T19:01:15.823Z,0 CVE-2021-46753,https://securityvulnerability.io/vulnerability/CVE-2021-46753,ASP Sensor Fusion Hub Vulnerability in AMD Products,"A vulnerability exists in the ASP Sensor Fusion Hub due to insufficient validation of length fields within sensor fusion hub headers. This flaw enables an attacker, leveraging a malicious user application (Uapp) or application binary loader (ABL), to map the ASP sensor fusion hub region and potentially overwrite its data structures. As a consequence, this may lead to a loss of data integrity and confidentiality.",Amd,"Ryzen™ 2000 Series Desktop Processors “raven Ridge” Am4,Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne” Am4,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “dali”/”dali” Ulp,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “pollock”,Ryzen™ 2000 Series Mobile Processors “raven Ridge” Fp5,Ryzen™ 3000 Series Mobile Processor, 2nd Gen Amd Ryzen™ Mobile Processors With Radeon™ Graphics “picasso”,Ryzen™ 3000 Series Mobile Processors With Radeon™ Graphics “renoir”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Ryzen™ 6000 Series Mobile Processors ""rembrandt""",9.1,CRITICAL,0.0011899999808520079,false,false,false,false,,false,false,2023-05-09T19:00:04.895Z,0 CVE-2021-26365,https://securityvulnerability.io/vulnerability/CVE-2021-26365,Out of Bounds Read Vulnerability in AMD Firmware,"An issue exists in certain AMD firmware where improper handling of size values in binary headers may allow for out of bounds read vulnerabilities during the signature validation process. This flaw can lead to denial of service attacks, and potentially, unauthorized access to sensitive information from out-of-bounds memory, heightening the risk to affected systems and user data.",Amd,"Ryzen™ 2000 Series Desktop Processors “raven Ridge” Am4,Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne” Am4,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “dali”/”dali” Ulp,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “pollock”,Ryzen™ 2000 Series Mobile Processors “raven Ridge” Fp5,Ryzen™ 3000 Series Mobile Processor, 2nd Gen Amd Ryzen™ Mobile Processors With Radeon™ Graphics “picasso”,Ryzen™ 3000 Series Mobile Processors With Radeon™ Graphics “renoir”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Ryzen™ 6000 Series Mobile Processors ""rembrandt""",8.2,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2023-05-09T18:58:57.236Z,0