CVE-2021-46754

high-risk
Published 2023-05-09

Insufficient input validation in the ASP (AMD Secure Processor) bootloader may allow an attacker with a compromised Uapp or ABL to coerce the bootloader into exposing sensitive information to the SMU (System Management Unit) resulting in a potential loss of confidentiality and integrity.

Do I need to act?

-
0.18% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10 Critical
NETWORK / LOW complexity

Affected Products (20)

Ryzen 5300G Firmware
Ryzen 5300Ge Firmware
Ryzen 5500 Firmware
Ryzen 5600 Firmware
Ryzen 5600G Firmware
Ryzen 5600Ge Firmware
Ryzen 5600X Firmware
Ryzen 5700G Firmware
Ryzen 5700Ge Firmware
Ryzen 5700X Firmware
Ryzen 5800 Firmware
Ryzen 5800X3D Firmware
Ryzen 5800X Firmware
Ryzen 5900 Firmware
Ryzen 5900X Firmware
Ryzen 5945Wx Firmware
Ryzen 5950X Firmware
Ryzen 5955Wx Firmware
Ryzen 5965Wx Firmware
Ryzen 5975Wx Firmware

Affected Vendors

Amd
65
/ 100
high-risk
Severity 31/34 · Critical
Exploitability 1/34 · Minimal
Exposure 33/34 · Critical