Amd

Ryzen 3 3100 Firmware

38 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Published 14.11.2023 19:15:15
  • Last modified 21.11.2024 07:41:06

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

  • EPSS 0.34%
  • Published 14.11.2023 19:15:10
  • Last modified 21.11.2024 06:49:18

Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.

  • EPSS 0.18%
  • Published 14.11.2023 19:15:10
  • Last modified 21.11.2024 06:49:18

Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.

  • EPSS 0.02%
  • Published 14.11.2023 19:15:10
  • Last modified 21.11.2024 06:34:41

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

  • EPSS 0.08%
  • Published 20.09.2023 18:15:12
  • Last modified 27.06.2025 22:15:25

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

  • EPSS 0.05%
  • Published 20.09.2023 18:15:12
  • Last modified 27.06.2025 22:15:23

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

  • EPSS 0.08%
  • Published 08.08.2023 18:15:11
  • Last modified 21.11.2024 07:41:10

An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution.  ...

Exploit
  • EPSS 6.32%
  • Published 24.07.2023 20:15:10
  • Last modified 13.02.2025 17:16:01

An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

  • EPSS 0.06%
  • Published 09.05.2023 19:15:10
  • Last modified 28.01.2025 16:15:29

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.

  • EPSS 0.04%
  • Published 09.05.2023 19:15:10
  • Last modified 28.01.2025 16:15:27

Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity.