Amd

Ryzen 3 3350u Firmware

19 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 13.08.2024 17:15:17
  • Last modified 12.12.2024 20:41:56

A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.

  • EPSS 0.01%
  • Published 13.02.2024 20:15:52
  • Last modified 14.03.2025 18:15:25

Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.

  • EPSS 0.04%
  • Published 14.11.2023 19:15:15
  • Last modified 21.11.2024 07:41:04

TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.

  • EPSS 0.34%
  • Published 14.11.2023 19:15:10
  • Last modified 21.11.2024 06:49:18

Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.

  • EPSS 0.18%
  • Published 14.11.2023 19:15:10
  • Last modified 21.11.2024 06:49:18

Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.

  • EPSS 0.08%
  • Published 20.09.2023 18:15:12
  • Last modified 27.06.2025 22:15:25

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

  • EPSS 0.05%
  • Published 20.09.2023 18:15:12
  • Last modified 27.06.2025 22:15:23

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

  • EPSS 0.05%
  • Published 08.08.2023 18:15:11
  • Last modified 21.11.2024 07:41:06

Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.

  • EPSS 0.04%
  • Published 09.05.2023 19:15:10
  • Last modified 28.01.2025 16:15:27

Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity.

  • EPSS 0.06%
  • Published 09.05.2023 19:15:10
  • Last modified 28.01.2025 16:15:29

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.