CVE-2021-46754
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
09/05/2023
Last modified:
13/02/2024
Description
Insufficient input validation in the ASP (AMD<br />
Secure Processor) bootloader may allow an attacker with a compromised Uapp or<br />
ABL to coerce the bootloader into exposing sensitive information to the SMU<br />
(System Management Unit) resulting in a potential loss of confidentiality and<br />
integrity.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



