cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-31345,https://securityvulnerability.io/vulnerability/CVE-2023-31345,Improper Input Validation in AMD Products Leading to Potential Code Execution,"An improper input validation issue exists in the System Management Mode (SMM) handler of certain AMD processors. This vulnerability may allow a privileged attacker to manipulate the System Management RAM (SMRAM), which can potentially lead to unauthorized execution of arbitrary code. Attackers exploiting this flaw could gain increased privileges and perform malicious activities, making it crucial for users and organizations to apply the latest security patches and mitigate risks.",Amd,"Amd Epyc™ 7003 Processors,Amd Epyc™ 9004 Processors,Amd Instinct™ Mi300a,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9004,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",7.5,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-02-12T00:15:00.000Z,0 CVE-2023-31343,https://securityvulnerability.io/vulnerability/CVE-2023-31343,Improper Input Validation in SMM Handler on AMD Products,"The vulnerability arises from improper input validation in the System Management Mode (SMM) handler of various AMD processors, which could be exploited by a privileged attacker. If successfully exploited, this flaw allows the attacker to overwrite the System Management RAM (SMRAM), possibly enabling arbitrary code execution. This opens up significant security risks for systems utilizing these AMD products, making it critical to maintain up-to-date firmware and apply recommended security updates promptly.",Amd,"Amd Epyc™ 7003 Processors,Amd Epyc™ 9004 Processors,Amd Instinct™ Mi300a,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9004,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",7.5,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-02-11T22:35:04.110Z,0 CVE-2023-31342,https://securityvulnerability.io/vulnerability/CVE-2023-31342,Improper Input Validation in SMM Handler Affects AMD Products,"A vulnerability exists in the System Management Mode (SMM) handler of certain AMD processors due to improper input validation. This security flaw enables a privileged attacker to overwrite System Management RAM (SMRAM), which may potentially lead to arbitrary code execution. It is essential for users and administrators of affected AMD products to apply security best practices and updates to mitigate this risk.",Amd,"Amd Epyc™ 7003 Processors,Amd Epyc™ 9004 Processors,Amd Instinct™ Mi300a,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9004,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",7.5,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-02-11T22:24:02.153Z,0 CVE-2024-0179,https://securityvulnerability.io/vulnerability/CVE-2024-0179,SMM Callout Vulnerability in AmdCpmDisplayFeatureSMM Driver by AMD,"The AmdCpmDisplayFeatureSMM driver is prone to a significant SMM Callout vulnerability, allowing locally authenticated attackers to overwrite SMRAM. This exploitation could result in arbitrary code execution, potentially allowing unauthorized operations within the system. Such vulnerabilities pose serious risks as they may enable attackers to gain higher privileges and compromise the integrity of the affected system.",Amd,"Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ 3000 Series Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Ryzen™ Threadripper™ Pro 7000 Wx-series Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 8040 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000,Amd Ryzen™ Embedded 8000",8.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T20:52:24.110Z,221 CVE-2024-21925,https://securityvulnerability.io/vulnerability/CVE-2024-21925,Improper Input Validation in AmdPspP2CmboxV2 Driver by AMD,"The AmdPspP2CmboxV2 driver from AMD contains an improper input validation issue that could allow a privileged attacker to manipulate system memory. By exploiting this vulnerability, an attacker may overwrite SMRAM, leading to potential arbitrary code execution and compromising system integrity. This flaw underscores the importance of rigorous input validation processes in driver development to ensure system security.",Amd,"Amd Epyc™ 7001 Processors,Amd Epyc™ 7002 Processors,Amd Epyc™ 9004 Processors,Amd Epyc™ 7003 Processors,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ 3000 Series Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Ryzen™ Threadripper™ Pro 7000 Wx-series Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 8040 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Epyc™ Embedded 3000,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9004,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000,Amd Ryzen™ Embedded 8000",8.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T20:39:03.746Z,0 CVE-2024-21924,https://securityvulnerability.io/vulnerability/CVE-2024-21924,SMM Callout Vulnerability in AmdPlatformRasSspSmm Driver,"A vulnerability exists in the AmdPlatformRasSspSmm driver that enables an attacker with ring 0 access to alter boot services handlers. This flaw could lead to unauthorized execution of arbitrary code, compromising the integrity of the system and allowing for potential system manipulation or further exploitation.",Amd,"Amd Epyc™ 7002 Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Ryzen™ Threadripper™ Pro 7000 Wx-series Processors,Amd Epyc™ Embedded 7002 Processors",8.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T20:18:50.402Z,0 CVE-2023-31361,https://securityvulnerability.io/vulnerability/CVE-2023-31361,DLL Hijacking Vulnerability in AMD Integrated Management Technology (AIM-T),"A DLL hijacking vulnerability exists in the AMD Integrated Management Technology (AIM-T) Manageability Service, allowing attackers to exploit this flaw for privilege escalation. This could potentially lead to arbitrary code execution, posing significant risks to affected systems. Users are advised to review the security bulletin for mitigation strategies.",Amd,Aim-t (amd Integrated Management Technology) Software,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T20:07:05.296Z,0 CVE-2023-31360,https://securityvulnerability.io/vulnerability/CVE-2023-31360,Privilege Escalation in AMD Integrated Management Technology,"An issue has been identified in the installation directory of the AMD Integrated Management Technology (AIM-T) Manageability Service due to incorrect default permissions. This vulnerability could allow an attacker to escalate privileges, which may lead to arbitrary code execution on affected systems. Proper configuration and timely updates are essential to mitigate the risks associated with this vulnerability.",Amd,Aim-t(amd Integrated Management Technology) Software,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T20:01:48.822Z,0 CVE-2024-21966,https://securityvulnerability.io/vulnerability/CVE-2024-21966,DLL Hijacking Vulnerability in AMD Ryzen Master Utility,"The AMD Ryzen™ Master Utility is subject to a DLL hijacking vulnerability. This security flaw allows attackers to exploit the utility to achieve privilege escalation. If successfully executed, the attacker could run arbitrary code, potentially leading to unauthorized access and control over the affected system. It is essential for users of this utility to review the security bulletin and apply any available patches to mitigate this risk.",Amd,Amd Ryzen™ Master Utility,7.3,HIGH,0.0004299999854993075,false,,true,false,true,2025-02-14T07:50:33.000Z,false,false,false,,2025-02-11T19:56:25.414Z,0 CVE-2024-56161,https://securityvulnerability.io/vulnerability/CVE-2024-56161,Improper Signature Verification in AMD CPU Microcode Patch Loader,"A vulnerability exists in the AMD CPU ROM microcode patch loader, where improper signature verification can enable an attacker with local administrator privileges to load malicious microcode. This can compromise the confidentiality and integrity of sensitive information handled by a confidential guest operating within the Secure Encrypted Virtualization-Static Non-Precision (SEV-SNP) framework.",Amd,"Amd Epyc™ 7001 Series,Amd Epyc™ 7002 Series,Amd Epyc™ 7003 Series,Amd Epyc™ 9004 Series",7.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T17:24:01.185Z,974 CVE-2024-21975,https://securityvulnerability.io/vulnerability/CVE-2024-21975,Improper Input Validation in AMD NPU Driver Leads to Security Risks,"The AMD NPU driver is vulnerable due to improper input validation, which could allow an attacker to provide a specially crafted pointer. This vulnerability has the potential to lead to arbitrary code execution, thereby placing systems at significant security risk. Users of affected AMD products are advised to review their configurations and apply necessary updates as outlined in the AMD security bulletin.",Amd,Ryzen Ai Software,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21945,https://securityvulnerability.io/vulnerability/CVE-2024-21945,Privilege Escalation Risk in AMD Ryzen Master Monitoring SDK,"An improper configuration of default permissions found in the installation directory of the AMD Ryzen Master Monitoring SDK poses a vulnerability where unauthorized users could execute privileged actions. This vulnerability could enable an attacker to escalate privileges, potentially resulting in execution of arbitrary code, which may compromise the system's security. It is critical for users and administrators to review the permission settings and apply necessary updates to mitigate potential security risks.",Amd,Ryzen Master Monitoring Software Development Kit,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21957,https://securityvulnerability.io/vulnerability/CVE-2024-21957,Privilege Escalation Vulnerability in AMD Management Console,"The AMD Management Console has been identified with a vulnerability due to incorrect default permissions in its installation directory. This security flaw could allow an attacker to elevate privileges on the affected system, potentially leading to arbitrary code execution. Correct configurations and regular updates are essential to mitigate risks associated with these types of vulnerabilities.",Amd,Management Console,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21937,https://securityvulnerability.io/vulnerability/CVE-2024-21937,Privilege Escalation Vulnerability in AMD HIP SDK Installation Directory,"The AMD HIP SDK has been found to have an issue with incorrect default permissions in its installation directory. This flaw could potentially allow an attacker to escalate their privileges, leading to the possibility of arbitrary code execution within the affected environment. Proper permissions should be enforced to mitigate such risks and ensure the security of systems utilizing the AMD HIP SDK.",Amd,"Radeon Software,Radeon Software For Hip",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21938,https://securityvulnerability.io/vulnerability/CVE-2024-21938,Privilege Escalation Vulnerability in AMD Management Plugin for Microsoft System Center Configuration Manager,"A vulnerability exists in the AMD Management Plugin for the Microsoft System Center Configuration Manager (SCCM) that stems from incorrect default permissions in the installation directory. This misconfiguration can allow an attacker to escalate their privileges, potentially leading to arbitrary code execution on affected systems. Organizations using the AMD Management Plugin should review their configurations and apply the latest patches to mitigate this risk.",Amd,Management Plugin For Sccm,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21946,https://securityvulnerability.io/vulnerability/CVE-2024-21946,Privilege Escalation Vulnerability in AMD Ryzen Master Utility,"A vulnerability exists in the AMD Ryzen Master Utility that arises from incorrect default permissions in the installation directory. This flaw could enable an attacker to exploit the permissions to achieve privilege escalation, potentially allowing them to execute arbitrary code in the context of the affected user. It is crucial for users to review their installations and apply any available security updates to mitigate the associated risks.",Amd,Ryzen Master Utility For Overclocking Control,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21958,https://securityvulnerability.io/vulnerability/CVE-2024-21958,Privilege Escalation Vulnerability in AMD Provisioning Console,"The AMD Provisioning Console has been identified with incorrect default permissions within its installation directory. These inadequate permissions could potentially allow an attacker to exploit the system, achieving elevated privileges. This escalation may lead to arbitrary code execution, posing significant security risks to users of the software. Ensuring appropriate permission settings is essential for maintaining the integrity and security of systems utilizing the AMD Provisioning Console.",Amd,Provisioning Console,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21939,https://securityvulnerability.io/vulnerability/CVE-2024-21939,Privilege Escalation Vulnerability in AMD Cloud Manageability Service,"The vulnerability arises from incorrect default permissions within the installation directory of the AMD Cloud Manageability Service (ACMS). This flaw may allow an attacker to escalate privileges, leading to the potential execution of arbitrary code. Such a scenario could compromise system integrity and expose sensitive information, making it critical for users to address this security issue promptly.",Amd,Cloud Manageability Service,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2023-31349,https://securityvulnerability.io/vulnerability/CVE-2023-31349,Potential Privilege Escalation Vulnerability in AMD μProf Could Lead to Arbitrary Code Execution,"The AMD µProf installation directory features incorrect default permissions that can be exploited by an attacker to escalate their privileges. This unauthorized access could lead to arbitrary code execution, allowing malicious users to gain control over affected systems. Organizations using AMD µProf should review their installation security settings and apply necessary mitigations to prevent potential breaches.",Amd,Μprof Tool,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-13T16:57:28.998Z,0 CVE-2023-31348,https://securityvulnerability.io/vulnerability/CVE-2023-31348,Potential DLL Hijacking Vulnerability in AMD μProf Could Lead to Privilege Escalation and Arbitrary Code Execution,"A vulnerability exists within AMD µProf that exploits DLL hijacking techniques, enabling an attacker to escalate privileges. This flaw poses a significant risk as it may lead to arbitrary code execution, thereby compromising the integrity and security of affected systems. Vigilance and immediate action are advised to mitigate the potential implications of this vulnerability.",Amd,Μprof Tool,7.8,HIGH,0.0005300000193528831,false,,false,false,false,,,false,false,,2024-08-13T16:57:16.834Z,0 CVE-2023-20591,https://securityvulnerability.io/vulnerability/CVE-2023-20591,Persistence of Untrusted Platform Configuration Risks Memory Access,"The vulnerability arises from the improper re-initialization of the Input/Output Memory Management Unit (IOMMU) during the Dynamic Root of Trust for Measurement (DRTM) event. This flaw may enable an untrusted platform configuration to persist, which could allow attackers to read or modify hypervisor memory. The repercussions of this vulnerability include potential threats to the confidentiality, integrity, and availability of the affected systems, marking significant concerns for users relying on AMD hypervisor technologies.",Amd,"Amd Epyc™ 7003 Series Processors,Amd Epyc™ 9004 Series Processors,Amd Epyc™ Embedded 7003 Series Processors,Amd Epyc™ Embedded 9003 Series Processors",10,CRITICAL,0.000910000002477318,false,,false,false,false,,,false,false,,2024-08-13T16:53:23.681Z,0 CVE-2022-23817,https://securityvulnerability.io/vulnerability/CVE-2022-23817,Potential Privilege Escalation Vulnerability in ASP Secure OS,A security flaw exists in the ASP Secure OS due to insufficient validation of memory buffer operations. This vulnerability permits a malicious Trusted Application (TA) to access and modify the kernel's virtual address space. Such manipulation can result in unauthorized actions allowing the attacker to escalate privileges within the affected environment. The ramifications of this vulnerability underscore the necessity for robust security measures and timely updates to the affected systems.,Amd,"Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ Threadripper™ 3000 Series Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Ryzen™ Threadripper™ Pro 5000wx Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7045 Series Mobile Processors,Amd Ryzen™ Embedded R1000 Series Processors,Amd Ryzen™ Embedded R2000 Series Processors,Amd Ryzen™ Embedded 5000 Series Processors,Amd Ryzen™ Embedded 7000 Series Processors,Amd Ryzen™ Embedded V1000 Series Processors,Amd Ryzen™ Embedded V2000 Series Processors,Amd Ryzen™ Embedded V3000 Series Processors",7,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-13T16:51:45.468Z,0 CVE-2022-23815,https://securityvulnerability.io/vulnerability/CVE-2022-23815,Out of Bounds Write Vulnerability in APCB Firmware Could Lead to Arbitrary Code Execution,"A security vulnerability exists in the AMD APCB firmware due to improper bounds checking. This flaw allows an attacker to execute out of bounds write operations, which may corrupt the APCB entry. Such corruption can lead to various security implications, including the potential for arbitrary code execution, posing significant risks to the integrity of affected systems.",Amd,"Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzentm Embedded R1000,Amd Ryzentm Embedded R2000,Amd Ryzentm Embedded V1000",8.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-13T16:51:43.735Z,0 CVE-2021-26344,https://securityvulnerability.io/vulnerability/CVE-2021-26344,Potential Vulnerability in AMD PSP1 Configuration Block Could Allow Arbitrary Code Execution,"An out of bounds memory write vulnerability occurs when processing the AMD PSP1 Configuration Block (APCB), which could enable an attacker with necessary access to alter the BIOS image. This flaw could potentially be exploited to modify the APCB block, allowing for arbitrary code execution. Attackers capable of signing the modified BIOS images could leverage this vulnerability, potentially leading to severe security implications.",Amd,"Amd Epyc™ 7001 Series Processors,Amd Epyc™ 7002 Series Processors,Amd Epyc™ 7003 Series Processors,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ Threadripper™ 3000 Series Processors,Amd Ryzen™ Threadripper™ Pro 5000wx Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Processors With Radeon™ Graphics,Amd Epyc™ Embedded 7002 Series Processors,Amd Epyc™ Embedded 3000 Series Processors,Amd Epyc™ Embedded 7003 Series Processors,Amd Ryzen™ Embedded R1000 Series Processors,Amd Ryzen™ Embedded R2000 Series Processors,Amd Ryzen™ Embedded 5000 Series Processors,Amd Ryzen™ Embedded V1000 Series Processors,Amd Ryzen™ Embedded V2000 Series Processors,Amd Ryzen™ Embedded V3000 Series Processors",8.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-13T16:49:52.889Z,0 CVE-2023-31315,https://securityvulnerability.io/vulnerability/CVE-2023-31315,Potential vulnerability in MSR could lead to arbitrary code execution,"CVE-2023-31315 is a potential vulnerability in AMD's model specific register (MSR) that could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution. The vulnerability affects the majority of AMD processors and has been patched by AMD in the Ryzen 3000 Series desktop processors. It has not been exploited by ransomware groups. Additionally, there are warnings about multiple cloud service provider attacks related to the Black Hat USA conference, and a potential vulnerability in Office that could lead to sensitive data leakage.",Amd,"3rd Gen Amd Epyc™ Processors,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 3000,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9003,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V1000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ Threadripper™ 3000 Series Processors,Amd Ryzen™ Threadripper™ Pro Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7040 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7045 Series Mobile Processors,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processors With Radeon™ Graphics",7.5,HIGH,0.0004299999854993075,false,,true,false,false,,,false,false,,2024-08-12T13:38:00.000Z,0