Vulnerability Details : CVE-2021-46792
Time-of-check Time-of-use (TOCTOU) in the
BIOS2PSP command may allow an attacker with a malicious BIOS to create a race
condition causing the ASP bootloader to perform out-of-bounds SRAM reads upon
an S3 resume event potentially leading to a denial of service.
Vulnerability category: Denial of service
Products affected by CVE-2021-46792
- cpe:2.3:o:amd:ryzen_5950x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5800x3d_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5900x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5800x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5700ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:athlon_gold_3150ge_firmware:picassopi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:athlon_silver_3050ge_firmware:picassopi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5700x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5800_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5900_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5945wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5955wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5965wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5975wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_5995wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3100_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3100_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3300x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3300x_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3500_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3500_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3500x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3500x_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3600_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3600_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3600x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3600x_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3600xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3600xt_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3800x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3800x_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3800xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3800xt_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3900_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3900_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3900x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3900x_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3900xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3900xt_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3950x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_3950x_firmware:picasso_pi-fp5_1.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_1200_\(af\)_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_1200_\(af\)_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_1600_\(af\)_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_1600_\(af\)_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2200g_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2200g_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2200ge_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2200ge_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2300x_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2300x_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2400g_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2400g_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2400ge_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2400ge_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2500x_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2500x_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2600_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2600_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2600e_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2600e_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2600x_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2600x_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2700_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2700_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2700e_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2700e_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2700x_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2700x_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2920x_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2920x_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2950x_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2950x_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2970wx_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2970wx_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2990wx_firmware:pinnaclepi-am4_1.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:o:amd:ryzen_2990wx_firmware:raven-fp5-am4_1.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:o:amd:athlon_gold_3150g_firmware:picassopi-fp5_1.0.0.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-46792
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-46792
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.9
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2
|
3.6
|
NIST |
CWE ids for CVE-2021-46792
-
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-46792
-
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001
Access DeniedVendor Advisory
Jump to