Description
Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19551 | Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution. |
References
History
Wed, 18 Dec 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd ryzen Master Monitoring Software Development Kit
|
|
| CPEs | cpe:2.3:a:amd:ryzen_master_monitoring_software_development_kit:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Amd ryzen Master Monitoring Software Development Kit
|
Wed, 13 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd
Amd ryzen Master |
|
| CPEs | cpe:2.3:o:amd:ryzen_master:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Amd
Amd ryzen Master |
|
| Metrics |
ssvc
|
Tue, 12 Nov 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution. | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2024-11-13T20:18:46.240Z
Reserved: 2024-01-03T16:43:21.322Z
Link: CVE-2024-21945
Updated: 2024-11-13T20:18:39.426Z
Status : Analyzed
Published: 2024-11-12T18:15:18.450
Modified: 2024-12-18T18:58:24.397
Link: CVE-2024-21945
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD