Incorrect default permissions in the AMD RyzenTM Master Utility installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
History

Wed, 18 Dec 2024 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Amd ryzen Master Utility For Overclocking Control
CPEs cpe:2.3:a:amd:ryzen_master_utility_for_overclocking_control:*:*:*:*:*:*:*:*
Vendors & Products Amd ryzen Master Utility For Overclocking Control

Wed, 13 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd ryzen Master
CPEs cpe:2.3:o:amd:ryzen_master:*:*:*:*:*:*:*:*
Vendors & Products Amd
Amd ryzen Master
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 Nov 2024 17:30:00 +0000

Type Values Removed Values Added
Description Incorrect default permissions in the AMD RyzenTM Master Utility installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
Weaknesses CWE-276
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published: 2024-11-12T17:15:37.010Z

Updated: 2024-11-13T20:15:22.603Z

Reserved: 2024-01-03T16:43:21.322Z

Link: CVE-2024-21946

cve-icon Vulnrichment

Updated: 2024-11-13T20:15:16.346Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-12T18:15:18.633

Modified: 2024-12-18T19:00:53.060

Link: CVE-2024-21946

cve-icon Redhat

No data.