An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
History

Thu, 12 Dec 2024 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd radeon Pro W6300
Amd radeon Pro W6400
Amd radeon Pro W6600
Amd radeon Pro W6800
Amd radeon Rx 6300m
Amd radeon Rx 6400
Amd radeon Rx 6450m
Amd radeon Rx 6500 Xt
Amd radeon Rx 6500m
Amd radeon Rx 6550m
Amd radeon Rx 6550s
Amd radeon Rx 6600
Amd radeon Rx 6600 Xt
Amd radeon Rx 6600m
Amd radeon Rx 6600s
Amd radeon Rx 6650 Xt
Amd radeon Rx 6650m
Amd radeon Rx 6650m Xt
Amd radeon Rx 6700
Amd radeon Rx 6700 Xt
Amd radeon Rx 6700m
Amd radeon Rx 6700s
Amd radeon Rx 6750 Gre
Amd radeon Rx 6750 Xt
Amd radeon Rx 6800
Amd radeon Rx 6800 Xt
Amd radeon Rx 6800m
Amd radeon Rx 6800s
Amd radeon Rx 6850m Xt
Amd radeon Rx 6900 Xt
Amd radeon Rx 6950 Xt
Amd radeon Software
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*
cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*
cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*
Vendors & Products Amd
Amd radeon Pro W6300
Amd radeon Pro W6400
Amd radeon Pro W6600
Amd radeon Pro W6800
Amd radeon Rx 6300m
Amd radeon Rx 6400
Amd radeon Rx 6450m
Amd radeon Rx 6500 Xt
Amd radeon Rx 6500m
Amd radeon Rx 6550m
Amd radeon Rx 6550s
Amd radeon Rx 6600
Amd radeon Rx 6600 Xt
Amd radeon Rx 6600m
Amd radeon Rx 6600s
Amd radeon Rx 6650 Xt
Amd radeon Rx 6650m
Amd radeon Rx 6650m Xt
Amd radeon Rx 6700
Amd radeon Rx 6700 Xt
Amd radeon Rx 6700m
Amd radeon Rx 6700s
Amd radeon Rx 6750 Gre
Amd radeon Rx 6750 Xt
Amd radeon Rx 6800
Amd radeon Rx 6800 Xt
Amd radeon Rx 6800m
Amd radeon Rx 6800s
Amd radeon Rx 6850m Xt
Amd radeon Rx 6900 Xt
Amd radeon Rx 6950 Xt
Amd radeon Software

Tue, 13 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 17:00:00 +0000

Type Values Removed Values Added
Description An insufficient DRAM address validation in PMFW may allow a privileged attacker to read from an invalid DRAM address to SRAM, potentially resulting in data corruption or denial of service.
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published: 2024-08-13T16:52:11.777Z

Updated: 2024-11-21T15:32:34.695Z

Reserved: 2022-10-27T18:53:39.735Z

Link: CVE-2023-20510

cve-icon Vulnrichment

Updated: 2024-08-13T18:03:56.763Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-13T17:15:18.777

Modified: 2024-12-12T20:28:55.010

Link: CVE-2023-20510

cve-icon Redhat

No data.