CVE-2021-26391
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/11/2022
Last modified:
01/05/2025
Description
Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* | 22.10.20 (excluding) | |
| cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* | 22.q2 (excluding) | |
| cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* | 22.5.2 (excluding) | |
| cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



