CVE-2021-46759
high-risk
Published 2023-05-09
Improper syscall input validation in AMD TEE (Trusted Execution Environment) may allow an attacker with physical access and control of a Uapp that runs under the bootloader to reveal the contents of the ASP (AMD Secure Processor) bootloader accessible memory to a serial port, resulting in a potential loss of integrity.
Do I need to act?
-
0.06% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10
Medium
PHYSICAL
/ LOW complexity
Affected Products (20)
Ryzen 5300G Firmware
Ryzen 5300G Firmware
Ryzen 5300Ge Firmware
Ryzen 5300Ge Firmware
Ryzen 5500 Firmware
Ryzen 5500 Firmware
Ryzen 5600 Firmware
Ryzen 5600 Firmware
Ryzen 5600G Firmware
Ryzen 5600G Firmware
Ryzen 5600Ge Firmware
Ryzen 5600Ge Firmware
Ryzen 5600X Firmware
Ryzen 5600X Firmware
Ryzen 5700G Firmware
Ryzen 5700G Firmware
Ryzen 5700Ge Firmware
Ryzen 5700Ge Firmware
Ryzen 5700X Firmware
Ryzen 5700X Firmware
Affected Vendors
References (2)
53
/ 100
high-risk
Severity
20/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
33/34 · Critical