CVE-2021-46759

Severity CVSS v4.0:
Pending analysis
Type:
CWE-787 Out-of-bounds Write
Publication date:
09/05/2023
Last modified:
27/01/2025

Description

Improper syscall input validation in AMD TEE<br /> (Trusted Execution Environment) may allow an attacker with physical access and<br /> control of a Uapp that runs under the bootloader to reveal the contents of the<br /> ASP (AMD Secure Processor) bootloader accessible memory to a serial port,<br /> resulting in a potential loss of integrity.<br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br /> <br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_5300g_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_5300ge_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_5500_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.8:*:*:*:*:*:*:*
cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:ryzen_5600_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*