Amd

Athlon Gold 3150ge Firmware

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 13.08.2024 17:15:18
  • Zuletzt bearbeitet 15.05.2026 05:16:30

Insufficient checking of memory buffer in AMD Secure Processor (ASP) Secure OS may allow an attacker with a malicious trusted application to read/write to the ASP Secure OS kernel virtual address space, potentially resulting in privilege escalation.

  • EPSS 0.05%
  • Veröffentlicht 08.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:41:06

Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.

  • EPSS 6.7%
  • Veröffentlicht 08.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:41:10

A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 

  • EPSS 0.13%
  • Veröffentlicht 08.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:41:10

An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution.  ...

  • EPSS 0.18%
  • Veröffentlicht 09.05.2023 20:15:12
  • Zuletzt bearbeitet 21.11.2024 06:34:38

Insufficient input validation in the ASP (AMD Secure Processor) bootloader may allow an attacker with a compromised Uapp or ABL to coerce the bootloader into exposing sensitive information to the SMU (System Management Unit) resulting in a potential ...

  • EPSS 0.07%
  • Veröffentlicht 09.05.2023 20:15:12
  • Zuletzt bearbeitet 27.01.2025 18:15:28

Improper syscall input validation in AMD TEE (Trusted Execution Environment) may allow an attacker with physical access and control of a Uapp that runs under the bootloader to reveal the contents of the ASP (AMD Secure Processor) bootloader accessibl...

  • EPSS 0.19%
  • Veröffentlicht 09.05.2023 20:15:12
  • Zuletzt bearbeitet 28.01.2025 16:15:33

Time-of-check Time-of-use (TOCTOU) in the BIOS2PSP command may allow an attacker with a malicious BIOS to create a race condition causing the ASP bootloader to perform out-of-bounds SRAM reads upon an S3 resume event potentially leading to a denial o...

  • EPSS 0.25%
  • Veröffentlicht 09.05.2023 20:15:12
  • Zuletzt bearbeitet 28.01.2025 16:15:33

Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.

  • EPSS 0.28%
  • Veröffentlicht 09.05.2023 19:15:11
  • Zuletzt bearbeitet 28.01.2025 16:15:31

Failure to validate the length fields of the ASP (AMD Secure Processor) sensor fusion hub headers may allow an attacker with a malicious Uapp or ABL to map the ASP sensor fusion hub region and overwrite data structures leading to a potential loss of ...

  • EPSS 0.25%
  • Veröffentlicht 09.05.2023 19:15:10
  • Zuletzt bearbeitet 28.01.2025 16:15:30

Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.