CVE-2020-12931

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/11/2022
Last modified:
17/09/2024

Description

Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* 22.10.20 (excluding)
cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* 22.q2 (excluding)
cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* 22.5.2 (excluding)
cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*