Vulnerability Details CVE-2023-20510
An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 4.6%
CVSS Severity
CVSS v3 Score 4.7
Products affected by CVE-2023-20510
-
cpe:2.3:a:amd:radeon_software:-
-
cpe:2.3:a:amd:radeon_software:23.7.1
-
cpe:2.3:a:amd:radeon_software:23.q3
-
cpe:2.3:a:amd:radeon_software:23.q4
-
cpe:2.3:h:amd:radeon_pro_w6300:-
-
cpe:2.3:h:amd:radeon_pro_w6400:-
-
cpe:2.3:h:amd:radeon_pro_w6600:-
-
cpe:2.3:h:amd:radeon_pro_w6800:-
-
cpe:2.3:h:amd:radeon_rx_6300m:-
-
cpe:2.3:h:amd:radeon_rx_6400:-
-
cpe:2.3:h:amd:radeon_rx_6450m:-
-
cpe:2.3:h:amd:radeon_rx_6500_xt:-
-
cpe:2.3:h:amd:radeon_rx_6500m:-
-
cpe:2.3:h:amd:radeon_rx_6550m:-
-
cpe:2.3:h:amd:radeon_rx_6550s:-
-
cpe:2.3:h:amd:radeon_rx_6600:-
-
cpe:2.3:h:amd:radeon_rx_6600_xt:-
-
cpe:2.3:h:amd:radeon_rx_6600m:-
-
cpe:2.3:h:amd:radeon_rx_6600s:-
-
cpe:2.3:h:amd:radeon_rx_6650_xt:-
-
cpe:2.3:h:amd:radeon_rx_6650m:-
-
cpe:2.3:h:amd:radeon_rx_6650m_xt:-
-
cpe:2.3:h:amd:radeon_rx_6700:-
-
cpe:2.3:h:amd:radeon_rx_6700_xt:-
-
cpe:2.3:h:amd:radeon_rx_6700m:-
-
cpe:2.3:h:amd:radeon_rx_6700s:-
-
cpe:2.3:h:amd:radeon_rx_6750_gre:-
-
cpe:2.3:h:amd:radeon_rx_6750_xt:-
-
cpe:2.3:h:amd:radeon_rx_6800:-
-
cpe:2.3:h:amd:radeon_rx_6800_xt:-
-
cpe:2.3:h:amd:radeon_rx_6800m:-
-
cpe:2.3:h:amd:radeon_rx_6800s:-
-
cpe:2.3:h:amd:radeon_rx_6850m_xt:-
-
cpe:2.3:h:amd:radeon_rx_6900_xt:-
-
cpe:2.3:h:amd:radeon_rx_6950_xt:-