CVE-2021-46759
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
09/05/2023
Last modified:
27/01/2025
Description
Improper syscall input validation in AMD TEE<br />
(Trusted Execution Environment) may allow an attacker with physical access and<br />
control of a Uapp that runs under the bootloader to reveal the contents of the<br />
ASP (AMD Secure Processor) bootloader accessible memory to a serial port,<br />
resulting in a potential loss of integrity.<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5300g_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5300ge_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5500_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_5600_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



