4.7
CVE-2021-46795
- EPSS 0.04%
- Published 11.01.2023 08:15:13
- Last modified 09.04.2025 15:15:45
- Source psirt@amd.com
- Teams watchlist Login
- Open Login
A TOCTOU (time-of-check to time-of-use) vulnerability exists where an attacker may use a compromised BIOS to cause the TEE OS to read memory out of bounds that could potentially result in a denial of service.
Data is provided by the National Vulnerability Database (NVD)
Amd ≫ Comboam4v2 Pi Firmware Version < 1.2.0.5
Amd ≫ Renoirpi-fp6 Firmware Version < 1.0.0.7
Amd ≫ Cezannepi-fp6 Firmware Version < 1.0.0.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.132 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.7 | 1 | 3.6 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 4.7 | 1 | 3.6 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.