CVE-2021-46759

high-risk
Published 2023-05-09

Improper syscall input validation in AMD TEE (Trusted Execution Environment) may allow an attacker with physical access and control of a Uapp that runs under the bootloader to reveal the contents of the ASP (AMD Secure Processor) bootloader accessible memory to a serial port, resulting in a potential loss of integrity.

Do I need to act?

-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10 Medium
PHYSICAL / LOW complexity

Affected Products (20)

Ryzen 5300G Firmware
Ryzen 5300G Firmware
Ryzen 5300Ge Firmware
Ryzen 5300Ge Firmware
Ryzen 5500 Firmware
Ryzen 5500 Firmware
Ryzen 5600 Firmware
Ryzen 5600 Firmware
Ryzen 5600G Firmware
Ryzen 5600G Firmware
Ryzen 5600Ge Firmware
Ryzen 5600Ge Firmware
Ryzen 5600X Firmware
Ryzen 5600X Firmware
Ryzen 5700G Firmware
Ryzen 5700G Firmware
Ryzen 5700Ge Firmware
Ryzen 5700Ge Firmware
Ryzen 5700X Firmware
Ryzen 5700X Firmware

Affected Vendors

Amd
53
/ 100
high-risk
Severity 20/34 · Moderate
Exploitability 0/34 · Minimal
Exposure 33/34 · Critical