Amd

Radeon Rx Vega 56 Firmware

8 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 6.64%
  • Published 14.11.2023 19:15:25
  • Last modified 21.11.2024 08:01:46

Improper input validation in the AMD RadeonTM Graphics display driver may allow an attacker to corrupt the display potentially resulting in denial of service.

  • EPSS 0.03%
  • Published 14.11.2023 19:15:15
  • Last modified 13.02.2025 17:16:01

Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch AMDSoftwareInstaller.exe without validating the file signature potentially leading to arbitrary code execution.

  • EPSS 0.03%
  • Published 14.11.2023 19:15:15
  • Last modified 13.02.2025 17:16:01

Improper signature verification of RadeonTM RX Vega M Graphics driver for Windows may allow an attacker with admin privileges to launch RadeonInstaller.exe without validating the file signature potentially leading to arbitrary code execution.

  • EPSS 0.1%
  • Published 14.11.2023 19:15:10
  • Last modified 13.02.2025 17:15:34

Insufficient bounds checking in the ASP (AMD Secure Processor) may allow an attacker to access memory outside the bounds of what is permissible to a TA (Trusted Application) resulting in a potential denial of service.

  • EPSS 0.03%
  • Published 09.11.2022 21:15:12
  • Last modified 01.05.2025 15:15:54

Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.

  • EPSS 0.13%
  • Published 09.11.2022 21:15:12
  • Last modified 21.11.2024 05:56:16

Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.

  • EPSS 0.13%
  • Published 09.11.2022 21:15:12
  • Last modified 21.11.2024 05:56:17

Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacke...

  • EPSS 0.1%
  • Published 09.11.2022 21:15:10
  • Last modified 21.11.2024 05:00:33

Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.