CVE-2021-26360

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/11/2022
Last modified:
01/05/2025

Description

An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* 22.10.20 (excluding)
cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* 22.q2 (excluding)
cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* 22.5.2 (excluding)
cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*