Vulnerability Details CVE-2021-26360
An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.1%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2021-26360
-
cpe:2.3:a:amd:enterprise_driver:*
-
cpe:2.3:a:amd:radeon_pro_software:*
-
cpe:2.3:a:amd:radeon_software:-
-
cpe:2.3:a:amd:radeon_software:20.11.2
-
cpe:2.3:a:amd:radeon_software:20.7.1
-
cpe:2.3:a:amd:radeon_software:21.3.1
-
cpe:2.3:a:amd:radeon_software:21.4.1
-
cpe:2.3:h:amd:radeon_pro_w6300m:-
-
cpe:2.3:h:amd:radeon_pro_w6400:-
-
cpe:2.3:h:amd:radeon_pro_w6500m:-
-
cpe:2.3:h:amd:radeon_pro_w6600:-
-
cpe:2.3:h:amd:radeon_pro_w6600m:-
-
cpe:2.3:h:amd:radeon_pro_w6600x:-
-
cpe:2.3:h:amd:radeon_pro_w6800:-
-
cpe:2.3:h:amd:radeon_pro_w6800x:-
-
cpe:2.3:h:amd:radeon_pro_w6800x_duo:-
-
cpe:2.3:h:amd:radeon_pro_w6900x:-
-
cpe:2.3:h:amd:radeon_rx_6300m:-
-
cpe:2.3:h:amd:radeon_rx_6400:-
-
cpe:2.3:h:amd:radeon_rx_6500_xt:-
-
cpe:2.3:h:amd:radeon_rx_6500m:-
-
cpe:2.3:h:amd:radeon_rx_6600:-
-
cpe:2.3:h:amd:radeon_rx_6600_xt:-
-
cpe:2.3:h:amd:radeon_rx_6600m:-
-
cpe:2.3:h:amd:radeon_rx_6600s:-
-
cpe:2.3:h:amd:radeon_rx_6650_xt:-
-
cpe:2.3:h:amd:radeon_rx_6650m:-
-
cpe:2.3:h:amd:radeon_rx_6650m_xt:-
-
cpe:2.3:h:amd:radeon_rx_6700:-
-
cpe:2.3:h:amd:radeon_rx_6700_xt:-
-
cpe:2.3:h:amd:radeon_rx_6700m:-
-
cpe:2.3:h:amd:radeon_rx_6700s:-
-
cpe:2.3:h:amd:radeon_rx_6750_xt:-
-
cpe:2.3:h:amd:radeon_rx_6800:-
-
cpe:2.3:h:amd:radeon_rx_6800_xt:-
-
cpe:2.3:h:amd:radeon_rx_6800m:-
-
cpe:2.3:h:amd:radeon_rx_6800s:-
-
cpe:2.3:h:amd:radeon_rx_6850m_xt:-
-
cpe:2.3:h:amd:radeon_rx_6900_xt:-
-
cpe:2.3:h:amd:radeon_rx_6950_xt:-