Insufficient input validation in the ABL may allow a privileged
attacker with access to the BIOS menu or UEFI shell to tamper with the
structure headers in SPI ROM causing an out of bounds memory read and write,
potentially resulting in memory corruption or denial of service.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Nov 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-125 CWE-787 |
Thu, 15 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 13 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Insufficient input validation in the ABL may allow a privileged attacker with access to the BIOS menu or UEFI shell to tamper with the structure headers in SPI ROM causing an out of bounds memory read and write, potentially resulting in memory corruption or denial of service. | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: AMD
Published: 2024-08-13T16:50:54.016Z
Updated: 2024-11-05T21:18:50.631Z
Reserved: 2022-03-31T16:50:27.872Z
Link: CVE-2021-46772
Vulnrichment
Updated: 2024-08-15T14:19:45.778Z
NVD
Status : Awaiting Analysis
Published: 2024-08-13T17:15:17.993
Modified: 2024-11-05T22:35:01.630
Link: CVE-2021-46772
Redhat
No data.