Amd

Ryzen 5 5600h Firmware

44 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Published 09.11.2022 21:15:12
  • Last modified 21.11.2024 05:56:16

Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.

  • EPSS 0.13%
  • Published 09.11.2022 21:15:12
  • Last modified 21.11.2024 05:56:17

Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacke...

  • EPSS 0.03%
  • Published 09.11.2022 21:15:12
  • Last modified 01.05.2025 15:15:54

Insufficient verification of multiple header signatures while loading a Trusted Application (TA) may allow an attacker with privileges to gain code execution in that TA or the OS/kernel.

  • EPSS 0.1%
  • Published 09.11.2022 21:15:11
  • Last modified 21.11.2024 05:00:33

Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.

  • EPSS 0.1%
  • Published 09.11.2022 21:15:10
  • Last modified 21.11.2024 05:00:33

Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.

  • EPSS 0.13%
  • Published 10.08.2022 20:15:24
  • Last modified 21.11.2024 06:34:42

Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues ...

  • EPSS 0.14%
  • Published 14.07.2022 20:15:08
  • Last modified 21.11.2024 05:56:15

A malformed SMI (System Management Interface) command may allow an attacker to establish a corrupted SMI Trigger Info data structure, potentially leading to out-of-bounds memory reads and writes when triggering an SMI resulting in a potential loss of...

  • EPSS 0.12%
  • Published 14.07.2022 20:15:08
  • Last modified 21.11.2024 05:56:15

An attacker with root account privileges can load any legitimately signed firmware image into the Audio Co-Processor (ACP,) irrespective of the respective signing key being declared as usable for authenticating an ACP firmware image, potentially resu...

  • EPSS 0.5%
  • Published 15.06.2022 20:15:17
  • Last modified 21.11.2024 06:49:19

A potential vulnerability in some AMD processors using frequency scaling may allow an authenticated attacker to execute a timing attack to potentially enable information disclosure.

  • EPSS 0.19%
  • Published 12.05.2022 19:15:48
  • Last modified 21.11.2024 05:56:05

Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.