Amd

Ryzen 3 3250u Firmware

30 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 13.08.2024 17:15:18
  • Last modified 18.03.2025 21:15:23

Improper bounds checking in APCB firmware may allow an attacker to perform an out of bounds write, corrupting the APCB entry, potentially leading to arbitrary code execution.

  • EPSS 0.01%
  • Published 13.02.2024 20:15:52
  • Last modified 14.03.2025 18:15:25

Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.

Exploit
  • EPSS 0.91%
  • Published 16.01.2024 17:15:08
  • Last modified 20.06.2025 18:15:22

A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.

  • EPSS 0.04%
  • Published 14.11.2023 19:15:15
  • Last modified 21.11.2024 07:41:04

TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.

  • EPSS 0.34%
  • Published 14.11.2023 19:15:10
  • Last modified 21.11.2024 06:49:18

Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.

  • EPSS 0.08%
  • Published 20.09.2023 18:15:12
  • Last modified 27.06.2025 22:15:25

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

  • EPSS 0.05%
  • Published 20.09.2023 18:15:12
  • Last modified 27.06.2025 22:15:23

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

  • EPSS 0.06%
  • Published 09.05.2023 19:15:10
  • Last modified 28.01.2025 16:15:29

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.

  • EPSS 0.17%
  • Published 09.05.2023 19:15:10
  • Last modified 28.01.2025 16:15:29

Certain size values in firmware binary headers could trigger out of bounds reads during signature validation, leading to denial of service or potentially limited leakage of information about out-of-bounds memory contents.

  • EPSS 0.04%
  • Published 09.05.2023 19:15:10
  • Last modified 28.01.2025 16:15:27

Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity.