Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
History

Wed, 18 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Amd ryzen Master Monitoring Software Development Kit
CPEs cpe:2.3:a:amd:ryzen_master_monitoring_software_development_kit:*:*:*:*:*:*:*:*
Vendors & Products Amd ryzen Master Monitoring Software Development Kit

Wed, 13 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd ryzen Master
CPEs cpe:2.3:o:amd:ryzen_master:*:*:*:*:*:*:*:*
Vendors & Products Amd
Amd ryzen Master
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 Nov 2024 17:30:00 +0000

Type Values Removed Values Added
Description Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Weaknesses CWE-276
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published: 2024-11-12T17:15:15.364Z

Updated: 2024-11-13T20:18:46.240Z

Reserved: 2024-01-03T16:43:21.322Z

Link: CVE-2024-21945

cve-icon Vulnrichment

Updated: 2024-11-13T20:18:39.426Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-12T18:15:18.450

Modified: 2024-12-18T18:58:24.397

Link: CVE-2024-21945

cve-icon Redhat

No data.