CVE-2021-46765
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
09/05/2023
Last modified:
27/01/2025
Description
Insufficient input validation in ASP may allow<br />
an attacker with a compromised SMM to induce out-of-bounds memory reads within<br />
the ASP, potentially leading to a denial of service.<br />
<br />
<br />
<br />
<br />
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:amd:ryzen_6600h_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_6600h:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_6600hs_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_6600hs:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_6600u_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_6600u:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_6800h_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_6800h:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_6800hs_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_6800hs:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_6800u_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_6800u:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_6900hs_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:ryzen_6900hs:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_6900hx_firmware:rembrandtpi-fp7_1.0.0.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



