Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service.
Metrics
Affected Vendors & Products
References
History
Fri, 13 Dec 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Amd
Amd radeon Pro W6300 Amd radeon Pro W6400 Amd radeon Pro W6600 Amd radeon Pro W6800 Amd radeon Rx 6300m Amd radeon Rx 6400 Amd radeon Rx 6450m Amd radeon Rx 6500 Xt Amd radeon Rx 6500m Amd radeon Rx 6550m Amd radeon Rx 6550s Amd radeon Rx 6600 Amd radeon Rx 6600 Xt Amd radeon Rx 6600m Amd radeon Rx 6600s Amd radeon Rx 6650 Xt Amd radeon Rx 6650m Amd radeon Rx 6650m Xt Amd radeon Rx 6700 Amd radeon Rx 6700 Xt Amd radeon Rx 6700m Amd radeon Rx 6700s Amd radeon Rx 6750 Gre Amd radeon Rx 6750 Xt Amd radeon Rx 6800 Amd radeon Rx 6800 Xt Amd radeon Rx 6800m Amd radeon Rx 6800s Amd radeon Rx 6850m Xt Amd radeon Rx 6900 Xt Amd radeon Rx 6950 Xt Amd radeon Software |
|
CPEs | cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:* cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:* cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6450m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6550m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6550s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6750_gre:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Amd
Amd radeon Pro W6300 Amd radeon Pro W6400 Amd radeon Pro W6600 Amd radeon Pro W6800 Amd radeon Rx 6300m Amd radeon Rx 6400 Amd radeon Rx 6450m Amd radeon Rx 6500 Xt Amd radeon Rx 6500m Amd radeon Rx 6550m Amd radeon Rx 6550s Amd radeon Rx 6600 Amd radeon Rx 6600 Xt Amd radeon Rx 6600m Amd radeon Rx 6600s Amd radeon Rx 6650 Xt Amd radeon Rx 6650m Amd radeon Rx 6650m Xt Amd radeon Rx 6700 Amd radeon Rx 6700 Xt Amd radeon Rx 6700m Amd radeon Rx 6700s Amd radeon Rx 6750 Gre Amd radeon Rx 6750 Xt Amd radeon Rx 6800 Amd radeon Rx 6800 Xt Amd radeon Rx 6800m Amd radeon Rx 6800s Amd radeon Rx 6850m Xt Amd radeon Rx 6900 Xt Amd radeon Rx 6950 Xt Amd radeon Software |
Tue, 03 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-129 |
Tue, 13 Aug 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 13 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service. | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: AMD
Published: 2024-08-13T16:54:03.514Z
Updated: 2024-12-03T16:30:08.173Z
Reserved: 2023-04-27T15:25:41.422Z
Link: CVE-2023-31307
Vulnrichment
Updated: 2024-08-13T18:03:27.707Z
NVD
Status : Analyzed
Published: 2024-08-13T17:15:20.500
Modified: 2024-12-13T16:30:30.840
Link: CVE-2023-31307
Redhat
No data.