cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-20508,https://securityvulnerability.io/vulnerability/CVE-2023-20508,Access Control Flaw in AMD Software Products,"An improper access control vulnerability in AMD Software could enable a privileged attacker to execute an out-of-bounds write operation to a memory segment that is not under their control. This flaw raises significant security concerns, potentially allowing unauthorized access to confidential information and compromising the integrity and availability of the affected system.",Amd,"Amd Radeon™ Rx 6000 Series Graphics Products,Amd Radeon™ Pro W6000 Series Graphics Products,Amd Radeon™ Instinct™ Mi25,Amd Radeon™ Pro V520,Amd Radeon™ Pro V620,Amd Radeon™ Pro V710,Amd Instinct™ Mi300a,Amd Instinct™ Mi300x,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7030 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 7045 Series Mobile Processors",5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T00:15:00.000Z,0 CVE-2023-31345,https://securityvulnerability.io/vulnerability/CVE-2023-31345,Improper Input Validation in AMD Products Leading to Potential Code Execution,"An improper input validation issue exists in the System Management Mode (SMM) handler of certain AMD processors. This vulnerability may allow a privileged attacker to manipulate the System Management RAM (SMRAM), which can potentially lead to unauthorized execution of arbitrary code. Attackers exploiting this flaw could gain increased privileges and perform malicious activities, making it crucial for users and organizations to apply the latest security patches and mitigate risks.",Amd,"Amd Epyc™ 7003 Processors,Amd Epyc™ 9004 Processors,Amd Instinct™ Mi300a,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9004,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",7.5,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-02-12T00:15:00.000Z,0 CVE-2024-21971,https://securityvulnerability.io/vulnerability/CVE-2024-21971,Input Validation Flaw in AMD Crash Defender Affects Windows Systems,"A vulnerability in AMD Crash Defender allows attackers to manipulate the Windows system process ID within a kernel-mode driver. This improper input validation can lead to system crashes, posing a risk of denial of service. Users of the affected product should apply updates promptly to mitigate these security concerns.",Amd,"Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7030 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7045 Series Mobile Processors,Amd Radeon™ Rx 5000 Series Graphics Products,Amd Radeon™ Pro W5000 Series Graphics Products,Amd Radeon™ Rx 7000 Series Graphics Products,Amd Radeon™ Pro W7000 Series Graphics Products,Amd Radeon™ Vii,Amd Radeon™ Pro Vii,Amd Radeon™ Instinct™ Mi25,Amd Radeon™ Pro V520,Amd Radeon™ Pro V620,Amd Radeon™ Pro V710,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V1000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T00:15:00.000Z,0 CVE-2023-31352,https://securityvulnerability.io/vulnerability/CVE-2023-31352,Memory Exposure Vulnerability in SEV Firmware by AMD,"A flaw in the SEV firmware could potentially let an attacker with the right privileges access sensitive unencrypted memory. This breach may enable unauthorized access to guest private data, posing a significant risk to data privacy and security. Organizations leveraging AMD's SEV technology should remain vigilant and apply the necessary security measures.",Amd,"Amd Epyc™ 9004 Processors,Amd Epyc™ Embedded 9004",6,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T22:44:28.001Z,0 CVE-2023-31343,https://securityvulnerability.io/vulnerability/CVE-2023-31343,Improper Input Validation in SMM Handler on AMD Products,"The vulnerability arises from improper input validation in the System Management Mode (SMM) handler of various AMD processors, which could be exploited by a privileged attacker. If successfully exploited, this flaw allows the attacker to overwrite the System Management RAM (SMRAM), possibly enabling arbitrary code execution. This opens up significant security risks for systems utilizing these AMD products, making it critical to maintain up-to-date firmware and apply recommended security updates promptly.",Amd,"Amd Epyc™ 7003 Processors,Amd Epyc™ 9004 Processors,Amd Instinct™ Mi300a,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9004,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",7.5,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-02-11T22:35:04.110Z,0 CVE-2023-31342,https://securityvulnerability.io/vulnerability/CVE-2023-31342,Improper Input Validation in SMM Handler Affects AMD Products,"A vulnerability exists in the System Management Mode (SMM) handler of certain AMD processors due to improper input validation. This security flaw enables a privileged attacker to overwrite System Management RAM (SMRAM), which may potentially lead to arbitrary code execution. It is essential for users and administrators of affected AMD products to apply security best practices and updates to mitigate this risk.",Amd,"Amd Epyc™ 7003 Processors,Amd Epyc™ 9004 Processors,Amd Instinct™ Mi300a,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9004,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",7.5,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-02-11T22:24:02.153Z,0 CVE-2023-31331,https://securityvulnerability.io/vulnerability/CVE-2023-31331,Improper Access Control Vulnerability in AMD DRTM Firmware,"This vulnerability involves improper access control in the DRTM firmware developed by AMD. Privileged attackers could exploit this flaw to perform multiple driver initializations, leading to stack memory corruption. The potential consequences of this vulnerability include loss of integrity and availability of the system, posing significant security risks to users. Timely updates and patches are recommended to mitigate these risks.",Amd,"Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 8040 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",3,LOW,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T21:44:03.782Z,0 CVE-2023-20582,https://securityvulnerability.io/vulnerability/CVE-2023-20582,Improper Handling of Nested Page Table Entries in AMD Products,"An improper handling of invalid nested page table entries in AMD's IOMMU could allow an attacker with privileged access to induce faults in page table entries, potentially circumventing RMP checks within the Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) framework. This flaw poses serious risks to the integrity of guest memory, potentially affecting the security of virtualized environments.",Amd,"Amd Epyc™ 9004 Processors,Amd Epyc™ Embedded 9004",5.3,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T21:35:15.949Z,0 CVE-2023-20581,https://securityvulnerability.io/vulnerability/CVE-2023-20581,Improper Access Control in IOMMU Affects AMD Products,"The vulnerability arises from inadequate access control mechanisms in the IOMMU, enabling a privileged attacker to circumvent the Rapid Memory Protection (RMP) checks. This could lead to significant risks concerning the integrity of guest memory, potentially allowing unauthorized access or manipulation of memory spaces within virtualized environments. It is crucial for affected users to refer to AMD's security bulletins for guidance on mitigation and remediation strategies.",Amd,"Amd Epyc™ 9004 Processors,Amd Epyc™ Embedded 9004",2.5,LOW,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T21:26:11.128Z,0 CVE-2023-20515,https://securityvulnerability.io/vulnerability/CVE-2023-20515,Improper Access Control in fTPM Driver Affects AMD Products,"The fTPM driver in trusted operating systems by AMD is susceptible to improper access control. This flaw enables a privileged attacker to manipulate system memory, which could compromise the integrity, confidentiality, and availability of system resources, leading to significant security implications for affected AMD products.",Amd,"Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ 3000 Series Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V1000,Amd Ryzen™ Embedded V3000",5.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T21:16:29.016Z,0 CVE-2023-20507,https://securityvulnerability.io/vulnerability/CVE-2023-20507,Integer Overflow Vulnerability in AMD's ASP Component,"An integer overflow vulnerability present in the ASP component of AMD products allows a privileged attacker to execute an out-of-bounds write. This could lead to substantial data integrity issues, potentially compromising sensitive information and disrupting operations within affected systems.",Amd,"Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",2.3,LOW,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T21:02:54.581Z,0 CVE-2024-0179,https://securityvulnerability.io/vulnerability/CVE-2024-0179,SMM Callout Vulnerability in AmdCpmDisplayFeatureSMM Driver by AMD,"The AmdCpmDisplayFeatureSMM driver is prone to a significant SMM Callout vulnerability, allowing locally authenticated attackers to overwrite SMRAM. This exploitation could result in arbitrary code execution, potentially allowing unauthorized operations within the system. Such vulnerabilities pose serious risks as they may enable attackers to gain higher privileges and compromise the integrity of the affected system.",Amd,"Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ 3000 Series Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Ryzen™ Threadripper™ Pro 7000 Wx-series Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 8040 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000,Amd Ryzen™ Embedded 8000",8.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T20:52:24.110Z,221 CVE-2024-21925,https://securityvulnerability.io/vulnerability/CVE-2024-21925,Improper Input Validation in AmdPspP2CmboxV2 Driver by AMD,"The AmdPspP2CmboxV2 driver from AMD contains an improper input validation issue that could allow a privileged attacker to manipulate system memory. By exploiting this vulnerability, an attacker may overwrite SMRAM, leading to potential arbitrary code execution and compromising system integrity. This flaw underscores the importance of rigorous input validation processes in driver development to ensure system security.",Amd,"Amd Epyc™ 7001 Processors,Amd Epyc™ 7002 Processors,Amd Epyc™ 9004 Processors,Amd Epyc™ 7003 Processors,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processor With Radeon™ Graphics,Amd Ryzen™ Threadripper™ 3000 Series Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Ryzen™ Threadripper™ Pro 7000 Wx-series Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processor With Radeon™ Graphics,Amd Ryzen™ 7040 Series Processors With Radeon™ Graphics,Amd Ryzen™ 8040 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7000 Series Mobile Processors,Amd Epyc™ Embedded 3000,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9004,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000,Amd Ryzen™ Embedded 8000",8.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T20:39:03.746Z,0 CVE-2024-21924,https://securityvulnerability.io/vulnerability/CVE-2024-21924,SMM Callout Vulnerability in AmdPlatformRasSspSmm Driver,"A vulnerability exists in the AmdPlatformRasSspSmm driver that enables an attacker with ring 0 access to alter boot services handlers. This flaw could lead to unauthorized execution of arbitrary code, compromising the integrity of the system and allowing for potential system manipulation or further exploitation.",Amd,"Amd Epyc™ 7002 Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Ryzen™ Threadripper™ Pro 5000wx- Series Desktop Processors,Amd Ryzen™ Threadripper™ Pro 7000 Wx-series Processors,Amd Epyc™ Embedded 7002 Processors",8.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T20:18:50.402Z,0 CVE-2023-31361,https://securityvulnerability.io/vulnerability/CVE-2023-31361,DLL Hijacking Vulnerability in AMD Integrated Management Technology (AIM-T),"A DLL hijacking vulnerability exists in the AMD Integrated Management Technology (AIM-T) Manageability Service, allowing attackers to exploit this flaw for privilege escalation. This could potentially lead to arbitrary code execution, posing significant risks to affected systems. Users are advised to review the security bulletin for mitigation strategies.",Amd,Aim-t (amd Integrated Management Technology) Software,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T20:07:05.296Z,0 CVE-2023-31360,https://securityvulnerability.io/vulnerability/CVE-2023-31360,Privilege Escalation in AMD Integrated Management Technology,"An issue has been identified in the installation directory of the AMD Integrated Management Technology (AIM-T) Manageability Service due to incorrect default permissions. This vulnerability could allow an attacker to escalate privileges, which may lead to arbitrary code execution on affected systems. Proper configuration and timely updates are essential to mitigate the risks associated with this vulnerability.",Amd,Aim-t(amd Integrated Management Technology) Software,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-11T20:01:48.822Z,0 CVE-2024-21966,https://securityvulnerability.io/vulnerability/CVE-2024-21966,DLL Hijacking Vulnerability in AMD Ryzen Master Utility,"The AMD Ryzen™ Master Utility is subject to a DLL hijacking vulnerability. This security flaw allows attackers to exploit the utility to achieve privilege escalation. If successfully executed, the attacker could run arbitrary code, potentially leading to unauthorized access and control over the affected system. It is essential for users of this utility to review the security bulletin and apply any available patches to mitigate this risk.",Amd,Amd Ryzen™ Master Utility,7.3,HIGH,0.0004299999854993075,false,,true,false,true,2025-02-14T07:50:33.000Z,false,false,false,,2025-02-11T19:56:25.414Z,0 CVE-2024-56161,https://securityvulnerability.io/vulnerability/CVE-2024-56161,Improper Signature Verification in AMD CPU Microcode Patch Loader,"A vulnerability exists in the AMD CPU ROM microcode patch loader, where improper signature verification can enable an attacker with local administrator privileges to load malicious microcode. This can compromise the confidentiality and integrity of sensitive information handled by a confidential guest operating within the Secure Encrypted Virtualization-Static Non-Precision (SEV-SNP) framework.",Amd,"Amd Epyc™ 7001 Series,Amd Epyc™ 7002 Series,Amd Epyc™ 7003 Series,Amd Epyc™ 9004 Series",7.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-03T17:24:01.185Z,974 CVE-2024-21958,https://securityvulnerability.io/vulnerability/CVE-2024-21958,Privilege Escalation Vulnerability in AMD Provisioning Console,"The AMD Provisioning Console has been identified with incorrect default permissions within its installation directory. These inadequate permissions could potentially allow an attacker to exploit the system, achieving elevated privileges. This escalation may lead to arbitrary code execution, posing significant security risks to users of the software. Ensuring appropriate permission settings is essential for maintaining the integrity and security of systems utilizing the AMD Provisioning Console.",Amd,Provisioning Console,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21946,https://securityvulnerability.io/vulnerability/CVE-2024-21946,Privilege Escalation Vulnerability in AMD Ryzen Master Utility,"A vulnerability exists in the AMD Ryzen Master Utility that arises from incorrect default permissions in the installation directory. This flaw could enable an attacker to exploit the permissions to achieve privilege escalation, potentially allowing them to execute arbitrary code in the context of the affected user. It is crucial for users to review their installations and apply any available security updates to mitigate the associated risks.",Amd,Ryzen Master Utility For Overclocking Control,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21937,https://securityvulnerability.io/vulnerability/CVE-2024-21937,Privilege Escalation Vulnerability in AMD HIP SDK Installation Directory,"The AMD HIP SDK has been found to have an issue with incorrect default permissions in its installation directory. This flaw could potentially allow an attacker to escalate their privileges, leading to the possibility of arbitrary code execution within the affected environment. Proper permissions should be enforced to mitigate such risks and ensure the security of systems utilizing the AMD HIP SDK.",Amd,"Radeon Software,Radeon Software For Hip",7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21938,https://securityvulnerability.io/vulnerability/CVE-2024-21938,Privilege Escalation Vulnerability in AMD Management Plugin for Microsoft System Center Configuration Manager,"A vulnerability exists in the AMD Management Plugin for the Microsoft System Center Configuration Manager (SCCM) that stems from incorrect default permissions in the installation directory. This misconfiguration can allow an attacker to escalate their privileges, potentially leading to arbitrary code execution on affected systems. Organizations using the AMD Management Plugin should review their configurations and apply the latest patches to mitigate this risk.",Amd,Management Plugin For Sccm,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21939,https://securityvulnerability.io/vulnerability/CVE-2024-21939,Privilege Escalation Vulnerability in AMD Cloud Manageability Service,"The vulnerability arises from incorrect default permissions within the installation directory of the AMD Cloud Manageability Service (ACMS). This flaw may allow an attacker to escalate privileges, leading to the potential execution of arbitrary code. Such a scenario could compromise system integrity and expose sensitive information, making it critical for users to address this security issue promptly.",Amd,Cloud Manageability Service,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21945,https://securityvulnerability.io/vulnerability/CVE-2024-21945,Privilege Escalation Risk in AMD Ryzen Master Monitoring SDK,"An improper configuration of default permissions found in the installation directory of the AMD Ryzen Master Monitoring SDK poses a vulnerability where unauthorized users could execute privileged actions. This vulnerability could enable an attacker to escalate privileges, potentially resulting in execution of arbitrary code, which may compromise the system's security. It is critical for users and administrators to review the permission settings and apply necessary updates to mitigate potential security risks.",Amd,Ryzen Master Monitoring Software Development Kit,7.3,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0 CVE-2024-21949,https://securityvulnerability.io/vulnerability/CVE-2024-21949,Improper Input Validation in NPU Driver Affects AMD Products,"An improper validation of user input in the NPU driver of AMD products can allow attackers to supply a buffer of unexpected size. This flaw may lead to system instability or crashes, posing a significant risk to affected systems. Users are advised to apply the necessary patches and updates from AMD to mitigate potential exploitation.",Amd,Ryzen Ai Software,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-11-12T18:15:00.000Z,0