7.8

CVE-2021-26360

An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.

Data is provided by the National Vulnerability Database (NVD)
AmdEnterprise Driver Version < 22.10.20
   AmdRadeon Pro W6300m Version-
   AmdRadeon Pro W6400 Version-
   AmdRadeon Pro W6500m Version-
   AmdRadeon Pro W6600 Version-
   AmdRadeon Pro W6600m Version-
   AmdRadeon Pro W6600x Version-
   AmdRadeon Pro W6800 Version-
   AmdRadeon Pro W6800x Version-
   AmdRadeon Pro W6800x Duo Version-
   AmdRadeon Pro W6900x Version-
   AmdRadeon Rx 6300m Version-
   AmdRadeon Rx 6400 Version-
   AmdRadeon Rx 6500 Xt Version-
   AmdRadeon Rx 6500m Version-
   AmdRadeon Rx 6600 Version-
   AmdRadeon Rx 6600 Xt Version-
   AmdRadeon Rx 6600m Version-
   AmdRadeon Rx 6600s Version-
   AmdRadeon Rx 6650 Xt Version-
   AmdRadeon Rx 6650m Version-
   AmdRadeon Rx 6650m Xt Version-
   AmdRadeon Rx 6700 Version-
   AmdRadeon Rx 6700 Xt Version-
   AmdRadeon Rx 6700m Version-
   AmdRadeon Rx 6700s Version-
   AmdRadeon Rx 6750 Xt Version-
   AmdRadeon Rx 6800 Version-
   AmdRadeon Rx 6800 Xt Version-
   AmdRadeon Rx 6800m Version-
   AmdRadeon Rx 6800s Version-
   AmdRadeon Rx 6850m Xt Version-
   AmdRadeon Rx 6900 Xt Version-
   AmdRadeon Rx 6950 Xt Version-
AmdRadeon Pro Software SwEditionenterprise Version < 22.q2
   AmdRadeon Pro W6300m Version-
   AmdRadeon Pro W6400 Version-
   AmdRadeon Pro W6500m Version-
   AmdRadeon Pro W6600 Version-
   AmdRadeon Pro W6600m Version-
   AmdRadeon Pro W6600x Version-
   AmdRadeon Pro W6800 Version-
   AmdRadeon Pro W6800x Version-
   AmdRadeon Pro W6800x Duo Version-
   AmdRadeon Pro W6900x Version-
   AmdRadeon Rx 6300m Version-
   AmdRadeon Rx 6400 Version-
   AmdRadeon Rx 6500 Xt Version-
   AmdRadeon Rx 6500m Version-
   AmdRadeon Rx 6600 Version-
   AmdRadeon Rx 6600 Xt Version-
   AmdRadeon Rx 6600m Version-
   AmdRadeon Rx 6600s Version-
   AmdRadeon Rx 6650 Xt Version-
   AmdRadeon Rx 6650m Version-
   AmdRadeon Rx 6650m Xt Version-
   AmdRadeon Rx 6700 Version-
   AmdRadeon Rx 6700 Xt Version-
   AmdRadeon Rx 6700m Version-
   AmdRadeon Rx 6700s Version-
   AmdRadeon Rx 6750 Xt Version-
   AmdRadeon Rx 6800 Version-
   AmdRadeon Rx 6800 Xt Version-
   AmdRadeon Rx 6800m Version-
   AmdRadeon Rx 6800s Version-
   AmdRadeon Rx 6850m Xt Version-
   AmdRadeon Rx 6900 Xt Version-
   AmdRadeon Rx 6950 Xt Version-
AmdRadeon Software Version < 22.5.2
   AmdRadeon Pro W6300m Version-
   AmdRadeon Pro W6400 Version-
   AmdRadeon Pro W6500m Version-
   AmdRadeon Pro W6600 Version-
   AmdRadeon Pro W6600m Version-
   AmdRadeon Pro W6600x Version-
   AmdRadeon Pro W6800 Version-
   AmdRadeon Pro W6800x Version-
   AmdRadeon Pro W6800x Duo Version-
   AmdRadeon Pro W6900x Version-
   AmdRadeon Rx 6300m Version-
   AmdRadeon Rx 6400 Version-
   AmdRadeon Rx 6500 Xt Version-
   AmdRadeon Rx 6500m Version-
   AmdRadeon Rx 6600 Version-
   AmdRadeon Rx 6600 Xt Version-
   AmdRadeon Rx 6600m Version-
   AmdRadeon Rx 6600s Version-
   AmdRadeon Rx 6650 Xt Version-
   AmdRadeon Rx 6650m Version-
   AmdRadeon Rx 6650m Xt Version-
   AmdRadeon Rx 6700 Version-
   AmdRadeon Rx 6700 Xt Version-
   AmdRadeon Rx 6700m Version-
   AmdRadeon Rx 6700s Version-
   AmdRadeon Rx 6750 Xt Version-
   AmdRadeon Rx 6800 Version-
   AmdRadeon Rx 6800 Xt Version-
   AmdRadeon Rx 6800m Version-
   AmdRadeon Rx 6800s Version-
   AmdRadeon Rx 6850m Xt Version-
   AmdRadeon Rx 6900 Xt Version-
   AmdRadeon Rx 6950 Xt Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.119
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.