CVE-2020-12931
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/11/2022
Last modified:
17/09/2024
Description
Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* | 22.10.20 (excluding) | |
| cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* | 22.q2 (excluding) | |
| cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* | 22.5.2 (excluding) | |
| cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



