CVE-2021-46757
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/02/2024
Last modified:
07/05/2025
Description
Insufficient checking of memory buffer in ASP<br />
Secure OS may allow an attacker with a malicious TA to read/write to the ASP<br />
Secure OS kernel virtual address space potentially leading to privilege<br />
escalation.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:amd:ryzen_embedded_5950e_firmware:*:*:*:*:*:*:*:* | embam4pi_1.0.0.0 (excluding) | |
| cpe:2.3:h:amd:ryzen_embedded_5950e:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_embedded_5900e_firmware:*:*:*:*:*:*:*:* | embam4pi_1.0.0.0 (excluding) | |
| cpe:2.3:h:amd:ryzen_embedded_5900e:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_embedded_5800e_firmware:*:*:*:*:*:*:*:* | embam4pi_1.0.0.0 (excluding) | |
| cpe:2.3:h:amd:ryzen_embedded_5800e:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_embedded_5600e_firmware:*:*:*:*:*:*:*:* | embam4pi_1.0.0.0 (excluding) | |
| cpe:2.3:h:amd:ryzen_embedded_5600e:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_embedded_v2516_firmware:*:*:*:*:*:*:*:* | embeddedpi-fp6_1.0.0.6 (excluding) | |
| cpe:2.3:h:amd:ryzen_embedded_v2516:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_embedded_v2546_firmware:*:*:*:*:*:*:*:* | embeddedpi-fp6_1.0.0.6 (excluding) | |
| cpe:2.3:h:amd:ryzen_embedded_v2546:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_embedded_v2718_firmware:*:*:*:*:*:*:*:* | embeddedpi-fp6_1.0.0.6 (excluding) | |
| cpe:2.3:h:amd:ryzen_embedded_v2718:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:amd:ryzen_embedded_v2748_firmware:*:*:*:*:*:*:*:* | embeddedpi-fp6_1.0.0.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



