Insufficient input validation in the ABL may allow a privileged attacker with access to the BIOS menu or UEFI shell to tamper with the structure headers in SPI ROM causing an out of bounds memory read and write, potentially resulting in memory corruption or denial of service.
History

Tue, 05 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
CWE-787

Thu, 15 Aug 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 17:00:00 +0000

Type Values Removed Values Added
Description Insufficient input validation in the ABL may allow a privileged attacker with access to the BIOS menu or UEFI shell to tamper with the structure headers in SPI ROM causing an out of bounds memory read and write, potentially resulting in memory corruption or denial of service.
References
Metrics cvssV3_1

{'score': 3.9, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published: 2024-08-13T16:50:54.016Z

Updated: 2024-11-05T21:18:50.631Z

Reserved: 2022-03-31T16:50:27.872Z

Link: CVE-2021-46772

cve-icon Vulnrichment

Updated: 2024-08-15T14:19:45.778Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-13T17:15:17.993

Modified: 2024-11-05T22:35:01.630

Link: CVE-2021-46772

cve-icon Redhat

No data.