CVE-2021-26393
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/11/2022
Last modified:
16/09/2024
Description
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:* | 22.10.20 (excluding) | |
| cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:* | 22.q2 (excluding) | |
| cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:* | 22.5.2 (excluding) | |
| cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



