Amd

Ryzen 7 5700g Firmware

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 13.08.2024 17:15:17
  • Zuletzt bearbeitet 12.12.2024 20:41:56

A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.

  • EPSS 0.01%
  • Veröffentlicht 13.02.2024 20:15:52
  • Zuletzt bearbeitet 14.03.2025 18:15:25

Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.

Exploit
  • EPSS 0.91%
  • Veröffentlicht 16.01.2024 17:15:08
  • Zuletzt bearbeitet 20.06.2025 18:15:22

A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.

  • EPSS 0.53%
  • Veröffentlicht 14.11.2023 19:15:16
  • Zuletzt bearbeitet 21.11.2024 07:41:11

Improper input validation in the SMM Supervisor may allow an attacker with a compromised SMI handler to gain Ring0 access potentially leading to arbitrary code execution.

  • EPSS 0.39%
  • Veröffentlicht 14.11.2023 19:15:15
  • Zuletzt bearbeitet 21.11.2024 07:41:09

A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation.

  • EPSS 0.13%
  • Veröffentlicht 14.11.2023 19:15:15
  • Zuletzt bearbeitet 21.11.2024 07:41:07

Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.

  • EPSS 0.13%
  • Veröffentlicht 14.11.2023 19:15:15
  • Zuletzt bearbeitet 21.11.2024 07:41:07

Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.

  • EPSS 0.13%
  • Veröffentlicht 14.11.2023 19:15:10
  • Zuletzt bearbeitet 21.11.2024 06:34:39

Insufficient validation of SPI flash addresses in the ASP (AMD Secure Processor) bootloader may allow an attacker to read data in memory mapped beyond SPI flash resulting in a potential loss of availability and integrity.

  • EPSS 0.08%
  • Veröffentlicht 08.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:41:10

An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution.  ...

Exploit
  • EPSS 0.63%
  • Veröffentlicht 08.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:41:08

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. ...