An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
References
Link | Resource |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-11-09 21:15
Updated : 2023-08-08 14:22
NVD link : CVE-2021-26360
Mitre link : CVE-2021-26360
CVE.ORG link : CVE-2021-26360
JSON object : View
Products Affected
amd
- radeon_pro_w6800x_duo
- radeon_rx_6800m
- radeon_rx_6800s
- radeon_pro_w6600
- radeon_rx_6500_xt
- radeon_rx_6800
- enterprise_driver
- radeon_rx_6700_xt
- radeon_pro_w6900x
- radeon_rx_6650m_xt
- radeon_rx_6950_xt
- radeon_rx_6650m
- radeon_rx_6650_xt
- radeon_pro_w6600m
- radeon_rx_6400
- radeon_rx_6800_xt
- radeon_rx_6300m
- radeon_pro_w6400
- radeon_rx_6900_xt
- radeon_pro_w6300m
- radeon_pro_w6800x
- radeon_rx_6600
- radeon_pro_w6600x
- radeon_pro_w6800
- radeon_pro_software
- radeon_rx_6600s
- radeon_rx_6600_xt
- radeon_rx_6700m
- radeon_rx_6850m_xt
- radeon_rx_6750_xt
- radeon_rx_6700
- radeon_pro_w6500m
- radeon_rx_6600m
- radeon_rx_6500m
- radeon_rx_6700s
- radeon_software
CWE