7

CVE-2022-23817

Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space, potentially leading to privilege escalation.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstelleramd
Produkt ryzen_3_3300x_firmware
Default Statusaffected
Version < comboam4v2_1.2.0.a
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_3_3300u_firmware
Default Statusaffected
Version < picassopi-fp5_1.0.0.e
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_3_pro_3200g_firmware
Default Statusaffected
Version < comboam4v2_pi_1.2.0.8
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_5_7500f_firmware
Default Statusaffected
Version < comboam5_1.0.8.0
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_threadripper_pro_3995wx_firmware
Default Statusaffected
Version < castlepeakpi-sp3r3_1.0.0.8
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_threadripper_pro_3995wx_firmware
Default Statusaffected
Version < castlepeakwspi-swrx8_1.0.0.a
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_threadripper_pro_5995wx_firmware
Default Statusaffected
Version < chagallwspi-swrx8_1.0.0.5
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_3_4300u_firmware
Default Statusaffected
Version < renoirpi-fp6_1.0.0.a
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_5_6600u_firmware
Default Statusaffected
Version < rembrandtpi-fp7_1.0.0.5
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_3_7335u_firmware
Default Statusaffected
Version < rembrandtpi-fp7_1.0.0.5
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_7_7745hx_firmware
Default Statusaffected
Version < dragonrangefl1pi_1.0.0.3b
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_5_5600x_firmware
Default Statusaffected
Version < comboam4v2_pi_1.2.0.8
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_3_5300g_firmware
Default Statusaffected
Version < cezannepi-fp6_1.0.0.c
Version 0
Status unaffected
Herstelleramd
Produkt ryzen_3_5425c_firmware
Default Statusaffected
Version < cezannepi-fp6_1.0.0.c
Version 0
Status unaffected
Herstelleramd
Produkt athlon_pro_300ge_firmware
Default Statusaffected
Version < picassopi-fp5_1.0.0.e
Version 0
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.173
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@amd.com 7 1 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.