Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity High
Privileges Required High
Scope Changed
Confidentiality Impact Low
Integrity Impact None
Availability Impact None
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00021.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Amd
Subscribe
|
Epyc 9124
Subscribe
Epyc 9124 Firmware
Subscribe
Epyc 9174f
Subscribe
Epyc 9174f Firmware
Subscribe
Epyc 9184x
Subscribe
Epyc 9184x Firmware
Subscribe
Epyc 9224
Subscribe
Epyc 9224 Firmware
Subscribe
Epyc 9254
Subscribe
Epyc 9254 Firmware
Subscribe
Epyc 9274f
Subscribe
Epyc 9274f Firmware
Subscribe
Epyc 9334
Subscribe
Epyc 9334 Firmware
Subscribe
Epyc 9354
Subscribe
Epyc 9354 Firmware
Subscribe
Epyc 9354p
Subscribe
Epyc 9354p Firmware
Subscribe
Epyc 9374f
Subscribe
Epyc 9374f Firmware
Subscribe
Epyc 9384x
Subscribe
Epyc 9384x Firmware
Subscribe
Epyc 9454
Subscribe
Epyc 9454 Firmware
Subscribe
Epyc 9454p
Subscribe
Epyc 9454p Firmware
Subscribe
Epyc 9474f
Subscribe
Epyc 9474f Firmware
Subscribe
Epyc 9534
Subscribe
Epyc 9534 Firmware
Subscribe
Epyc 9554
Subscribe
Epyc 9554 Firmware
Subscribe
Epyc 9554p
Subscribe
Epyc 9554p Firmware
Subscribe
Epyc 9634
Subscribe
Epyc 9634 Firmware
Subscribe
Epyc 9654
Subscribe
Epyc 9654 Firmware
Subscribe
Epyc 9654p
Subscribe
Epyc 9654p Firmware
Subscribe
Epyc 9684x
Subscribe
Epyc 9684x Firmware
Subscribe
Epyc 9734
Subscribe
Epyc 9734 Firmware
Subscribe
Epyc 9754
Subscribe
Epyc 9754 Firmware
Subscribe
Epyc 9754s
Subscribe
Epyc 9754s Firmware
Subscribe
Ryzen Threadripper Pro 3945wx
Subscribe
Ryzen Threadripper Pro 3945wx Firmware
Subscribe
Ryzen Threadripper Pro 3955wx
Subscribe
Ryzen Threadripper Pro 3955wx Firmware
Subscribe
Ryzen Threadripper Pro 3975wx
Subscribe
Ryzen Threadripper Pro 3975wx Firmware
Subscribe
Ryzen Threadripper Pro 3995wx
Subscribe
Ryzen Threadripper Pro 3995wx Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-33422 | Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2024-08-04T05:17:42.287Z
Reserved: 2022-03-31T16:50:27.871Z
Link: CVE-2021-46766
No data.
Status : Modified
Published: 2023-11-14T19:15:10.360
Modified: 2024-11-21T06:34:40.617
Link: CVE-2021-46766
No data.
OpenCVE Enrichment
No data.
EUVD