cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-20508,https://securityvulnerability.io/vulnerability/CVE-2023-20508,Access Control Flaw in AMD Software Products,"An improper access control vulnerability in AMD Software could enable a privileged attacker to execute an out-of-bounds write operation to a memory segment that is not under their control. This flaw raises significant security concerns, potentially allowing unauthorized access to confidential information and compromising the integrity and availability of the affected system.",Amd,"Amd Radeon™ Rx 6000 Series Graphics Products,Amd Radeon™ Pro W6000 Series Graphics Products,Amd Radeon™ Instinct™ Mi25,Amd Radeon™ Pro V520,Amd Radeon™ Pro V620,Amd Radeon™ Pro V710,Amd Instinct™ Mi300a,Amd Instinct™ Mi300x,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7030 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 7045 Series Mobile Processors",5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T00:15:00.000Z,0 CVE-2024-21971,https://securityvulnerability.io/vulnerability/CVE-2024-21971,Input Validation Flaw in AMD Crash Defender Affects Windows Systems,"A vulnerability in AMD Crash Defender allows attackers to manipulate the Windows system process ID within a kernel-mode driver. This improper input validation can lead to system crashes, posing a risk of denial of service. Users of the affected product should apply updates promptly to mitigate these security concerns.",Amd,"Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7030 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7045 Series Mobile Processors,Amd Radeon™ Rx 5000 Series Graphics Products,Amd Radeon™ Pro W5000 Series Graphics Products,Amd Radeon™ Rx 7000 Series Graphics Products,Amd Radeon™ Pro W7000 Series Graphics Products,Amd Radeon™ Vii,Amd Radeon™ Pro Vii,Amd Radeon™ Instinct™ Mi25,Amd Radeon™ Pro V520,Amd Radeon™ Pro V620,Amd Radeon™ Pro V710,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V1000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T00:15:00.000Z,0 CVE-2021-26367,https://securityvulnerability.io/vulnerability/CVE-2021-26367,Misconfiguration of TMRs May Lead to Loss of Integrity and Availability,"A security vulnerability exists in certain AMD processors wherein a malicious actor can exploit misconfigurations of Trusted Memory Regions (TMRs). This exploitation allows the attacker to define arbitrary address ranges for TMRs, which could lead to significant challenges concerning the integrity and availability of the system. It is essential for users of affected AMD products to be aware of this issue and to apply the available security updates provided by the vendor to mitigate risks.",Amd,"Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Processors With Radeon™ Graphics,Amd Radeon™ Rx 6000 Series Graphics Cards,Amd Radeon™ Pro W6000 Series Graphics Cards,Amd Ryzen™ Embedded R1000 Series Processors,Amd Ryzen™ Embedded R2000 Series Processors,Amd Ryzen™ Embedded V1000 Series Processors,Amd Ryzen™ Embedded V2000 Series Processors",6,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-13T16:50:05.825Z,0 CVE-2021-26392,https://securityvulnerability.io/vulnerability/CVE-2021-26392,Out-of-bounds Write Vulnerability in AMD Product,"The vulnerability arises from insufficient verification of size checks in the 'LoadModule' functionality, which may permit an out-of-bounds write. This flaw could potentially allow an attacker with appropriate privileges to execute code at the OS or kernel level by loading a malicious Trusted Application (TA), raising significant security concerns for affected AMD products.",Amd,"Amd Radeon Rx 5000 Series & Pro W5000 Series,Amd Radeon Rx 6000 Series & Pro W6000 Series,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded V1000,Amd Ryzen™ Embedded V2000,Amd Ryzen™embedded V3000",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-11-09T21:15:00.000Z,0 CVE-2020-12930,https://securityvulnerability.io/vulnerability/CVE-2020-12930,Privilege Escalation Vulnerability in AMD Secure Processor Drivers,"The vulnerability arises from improper handling of parameters within the AMD Secure Processor (ASP) drivers. This security flaw could be exploited by a privileged attacker to escalate their permissions, leading to potential integrity compromise of the system. Addressing this issue is crucial for maintaining the security standards of systems utilizing AMD technology.",Amd,"Amd Radeon Rx 5000 Series & Pro W5000 Series,Amd Ryzen(tm) Embedded R1000,Amd Ryzen(tm) Embedded R2000,Amd Ryzen(tm) Embedded 5000,Amd Ryzen(tm) Embedded V1000,Amd Ryzen(tm) Embedded V2000",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-11-09T21:15:00.000Z,0 CVE-2021-26391,https://securityvulnerability.io/vulnerability/CVE-2021-26391,Insufficient Header Signature Verification in AMD Trusted Applications,"This vulnerability arises from inadequate verification of multiple header signatures during the loading of Trusted Applications (TAs), potentially allowing an attacker with appropriate privileges to execute arbitrary code within the TA or affect the operating system and kernel. Such a vulnerability poses a significant risk to system integrity and confidentiality, necessitating immediate attention and remediation.",Amd,"Amd Radeon Rx 5000 Series & Pro W5000 Series,Amd Radeon Rx 6000 Series & Pro W6000 Series",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-11-09T21:15:00.000Z,0 CVE-2021-26393,https://securityvulnerability.io/vulnerability/CVE-2021-26393,Insufficient Memory Cleanup in AMD Secure Processor Affects Data Confidentiality,"The AMD Secure Processor (ASP) is susceptible to a vulnerability due to insufficient memory cleanup in its Trusted Execution Environment (TEE). This flaw could allow an authenticated attacker with appropriate privileges to create a valid signed Trusted Application (TA). By exploiting this, the attacker can manipulate the process memory, potentially injecting malicious data and compromising confidentiality.",Amd,"Amd Radeon Rx 5000 Series & Pro W5000 Series,Amd Radeon Rx 6000 Series & Pro W6000 Series,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded V1000,Amd Ryzen™ Embedded V2000",5.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-11-09T21:15:00.000Z,0 CVE-2020-12931,https://securityvulnerability.io/vulnerability/CVE-2020-12931,Privilege Escalation Vulnerability in AMD Secure Processor Kernel,"The AMD Secure Processor kernel contains an improper parameters handling vulnerability that could be exploited by a privileged attacker. This flaw may allow unauthorized escalation of privileges, potentially compromising system integrity and exposing sensitive information. It is crucial to apply patches and security updates to mitigate associated risks.",Amd,"Amd Radeon Rx 5000 Series & Pro W5000 Series,Amd Ryzen(tm) Embedded R1000,Amd Ryzen(tm) Embedded R2000,Amd Ryzen(tm) Embedded 5000,Amd Ryzen(tm) Embedded V1000",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-11-09T21:15:00.000Z,0