Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
History

Fri, 13 Dec 2024 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd radeon Pro W6300
Amd radeon Pro W6400
Amd radeon Pro W6600
Amd radeon Pro W6800
Amd radeon Rx 6300m
Amd radeon Rx 6400
Amd radeon Rx 6450m
Amd radeon Rx 6500 Xt
Amd radeon Rx 6500m
Amd radeon Rx 6550m
Amd radeon Rx 6550s
Amd radeon Rx 6600
Amd radeon Rx 6600 Xt
Amd radeon Rx 6600m
Amd radeon Rx 6600s
Amd radeon Rx 6650 Xt
Amd radeon Rx 6650m
Amd radeon Rx 6650m Xt
Amd radeon Rx 6700
Amd radeon Rx 6700 Xt
Amd radeon Rx 6700m
Amd radeon Rx 6700s
Amd radeon Rx 6750 Gre
Amd radeon Rx 6750 Xt
Amd radeon Rx 6800
Amd radeon Rx 6800 Xt
Amd radeon Rx 6800m
Amd radeon Rx 6800s
Amd radeon Rx 6850m Xt
Amd radeon Rx 6900 Xt
Amd radeon Rx 6950 Xt
Amd radeon Software
CPEs cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*
cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*
cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*
Vendors & Products Amd
Amd radeon Pro W6300
Amd radeon Pro W6400
Amd radeon Pro W6600
Amd radeon Pro W6800
Amd radeon Rx 6300m
Amd radeon Rx 6400
Amd radeon Rx 6450m
Amd radeon Rx 6500 Xt
Amd radeon Rx 6500m
Amd radeon Rx 6550m
Amd radeon Rx 6550s
Amd radeon Rx 6600
Amd radeon Rx 6600 Xt
Amd radeon Rx 6600m
Amd radeon Rx 6600s
Amd radeon Rx 6650 Xt
Amd radeon Rx 6650m
Amd radeon Rx 6650m Xt
Amd radeon Rx 6700
Amd radeon Rx 6700 Xt
Amd radeon Rx 6700m
Amd radeon Rx 6700s
Amd radeon Rx 6750 Gre
Amd radeon Rx 6750 Xt
Amd radeon Rx 6800
Amd radeon Rx 6800 Xt
Amd radeon Rx 6800m
Amd radeon Rx 6800s
Amd radeon Rx 6850m Xt
Amd radeon Rx 6900 Xt
Amd radeon Rx 6950 Xt
Amd radeon Software

Tue, 03 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-129

Tue, 13 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 17:00:00 +0000

Type Values Removed Values Added
Description Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
References
Metrics cvssV3_1

{'score': 2.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published: 2024-08-13T16:54:03.514Z

Updated: 2024-12-03T16:30:08.173Z

Reserved: 2023-04-27T15:25:41.422Z

Link: CVE-2023-31307

cve-icon Vulnrichment

Updated: 2024-08-13T18:03:27.707Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-13T17:15:20.500

Modified: 2024-12-13T16:30:30.840

Link: CVE-2023-31307

cve-icon Redhat

No data.