CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

AMD : Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2022-27677 269 Exec Code 2023-03-01 2023-03-09
0.0
None ??? ??? ??? ??? ??? ???
Failure to validate privileges during installation of AMD Ryzen™ Master may allow an attacker with low privileges to modify files potentially leading to privilege escalation and code execution by the lower privileged user.
2 CVE-2022-27673 2022-11-09 2022-11-16
0.0
None ??? ??? ??? ??? ??? ???
Insufficient access controls in the AMD Link Android app may potentially result in information disclosure.
3 CVE-2021-26400 2022-05-11 2022-05-25
2.1
None Local Low Not required Partial None None
AMD processors may speculatively re-order load instructions which can result in stale data being observed when multiple processors are operating on shared memory, resulting in potential data leakage.
4 CVE-2021-26369 119 Overflow 2022-05-12 2022-06-01
4.6
None Local Low Not required Partial Partial Partial
A malicious or compromised UApp or ABL may be used by an attacker to send a malformed system call to the bootloader, resulting in out-of-bounds memory accesses.
5 CVE-2021-26366 668 +Priv 2022-05-12 2022-06-01
3.6
None Local Low Not required Partial Partial None
An attacker, who gained elevated privileges via some other vulnerability, may be able to read data from Boot ROM resulting in a loss of system integrity.
6 CVE-2021-26363 668 2022-05-12 2022-06-01
3.6
None Local Low Not required Partial Partial None
A malicious or compromised UApp or ABL could potentially change the value that the ASP uses for its reserved DRAM, to one outside of the fenced area, potentially leading to data exposure.
7 CVE-2021-26362 2022-05-12 2022-06-08
6.6
None Local Low Not required None Complete Complete
A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.
8 CVE-2021-26361 668 2022-05-12 2022-06-01
2.1
None Local Low Not required Partial None None
A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.
9 CVE-2021-26333 909 +Info 2021-09-21 2022-04-26
4.9
None Local Low Not required Complete None None
An information disclosure vulnerability exists in AMD Platform Security Processor (PSP) chipset driver. The discretionary access control list (DACL) may allow low privileged users to open a handle and send requests to the driver resulting in a potential data leak from uninitialized physical pages.
10 CVE-2021-26317 668 Exec Code 2022-05-12 2022-06-01
7.2
None Local Low Not required Complete Complete Complete
Failure to verify the protocol in SMM may allow an attacker to control the protocol and modify SPI flash resulting in a potential arbitrary code execution.
11 CVE-2021-26311 77 Exec Code 2021-05-13 2021-05-25
9.0
None Remote Low ??? Complete Complete Complete
In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
12 CVE-2020-12967 77 Exec Code 2021-05-13 2021-05-25
9.0
None Remote Low ??? Complete Complete Complete
The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor.
13 CVE-2020-12964 DoS +Info 2021-11-15 2022-07-12
4.6
None Local Low Not required Partial Partial Partial
A potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.
14 CVE-2020-12933 125 DoS 2020-10-13 2020-10-21
4.9
None Local Low Not required None None Complete
A denial of service vulnerability exists in the D3DKMTEscape handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTEscape API request can cause an out-of-bounds read in Windows OS kernel memory area. This vulnerability can be triggered from a non-privileged account.
15 CVE-2020-12928 2020-10-13 2021-11-04
7.2
None Local Low Not required Complete Complete Complete
A vulnerability in a dynamically loaded AMD driver in AMD Ryzen Master V15 may allow any authenticated user to escalate privileges to NT authority system.
16 CVE-2020-12927 2020-11-12 2020-11-30
7.2
None Local Low Not required Complete Complete Complete
A potential vulnerability in a dynamically loaded AMD driver in AMD VBIOS Flash Tool SDK may allow any authenticated user to escalate privileges to NT authority system.
17 CVE-2020-12926 367 DoS 2020-11-12 2020-11-30
4.4
None Local Medium Not required Partial Partial Partial
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device.
18 CVE-2020-12920 DoS 2021-11-15 2021-11-18
2.1
None Local Low Not required None None Partial
A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.
19 CVE-2020-12912 203 2020-11-12 2020-12-03
2.1
None Local Low Not required Partial None None
A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.
20 CVE-2020-12911 125 DoS 2020-10-13 2020-10-22
4.9
None Local Low Not required None None Complete
A denial of service vulnerability exists in the D3DKMTCreateAllocation handler functionality of AMD ATIKMDAG.SYS (e.g. version 26.20.15029.27017). A specially crafted D3DKMTCreateAllocation API request can cause an out-of-bounds read and denial of service (BSOD). This vulnerability can be triggered from a non-privileged account.
21 CVE-2020-12891 427 2022-02-04 2022-02-09
4.4
None Local Medium Not required Partial Partial Partial
AMD Radeon Software may be vulnerable to DLL Hijacking through path variable. An unprivileged user may be able to drop its malicious DLL file in any location which is in path environment variable.
22 CVE-2020-12890 Exec Code 2021-12-10 2021-12-15
7.2
None Local Low Not required Complete Complete Complete
Improper handling of pointers in the System Management Mode (SMM) handling code may allow for a privileged attacker with physical or administrative access to potentially manipulate the AMD Generic Encapsulated Software Architecture (AGESA) to execute arbitrary code undetected by the operating system.
23 CVE-2020-12138 269 2020-04-27 2021-07-21
9.0
None Remote Low ??? Complete Complete Complete
AMD ATI atillk64.sys 5.11.9.0 allows low-privileged users to interact directly with physical memory by calling one of several driver routines that map physical memory into the virtual address space of the calling process. This could enable low-privileged users to achieve NT AUTHORITY\SYSTEM privileges via a DeviceIoControl call associated with MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPagedPool, or MmMapLockedPages.
24 CVE-2020-6103 787 Exec Code 2020-07-20 2020-07-24
6.5
None Remote Low ??? Partial Partial Partial
An exploitable code execution vulnerability exists in the Shader functionality of AMD Radeon DirectX 11 Driver atidxx64.dll 26.20.15019.19000. An attacker can provide a a specially crafted shader file to trigger this vulnerability, resulting in code execution. This vulnerability can be triggered from a HYPER-V guest using the RemoteFX feature, leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly).
25 CVE-2020-6102 787 Exec Code 2020-07-20 2022-04-27
6.5
None Remote Low ??? Partial Partial Partial
An exploitable code execution vulnerability exists in the Shader functionality of AMD Radeon DirectX 11 Driver atidxx64.dll 26.20.15019.19000. An attacker can provide a a specially crafted shader file to trigger this vulnerability, resulting in code execution. This vulnerability can be triggered from a HYPER-V guest using the RemoteFX feature, leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly).
26 CVE-2020-6101 787 Exec Code 2020-07-20 2020-07-24
6.5
None Remote Low ??? Partial Partial Partial
An exploitable code execution vulnerability exists in the Shader functionality of AMD Radeon DirectX 11 Driver atidxx64.dll 26.20.15019.19000. An attacker can provide a specially crafted shader file to trigger this vulnerability, resulting in code execution. This vulnerability can be triggered from a HYPER-V guest using the RemoteFX feature, leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly).
27 CVE-2020-6100 787 Mem. Corr. 2020-07-20 2020-07-24
6.5
None Remote Low ??? Partial Partial Partial
An exploitable memory corruption vulnerability exists in AMD atidxx64.dll 26.20.15019.19000 graphics driver. A specially crafted pixel shader can cause memory corruption vulnerability. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability potentially could be triggered from guest machines running virtualization environments (ie. VMware, qemu, VirtualBox etc.) in order to perform guest-to-host escape - as it was demonstrated before (TALOS-2018-0533, TALOS-2018-0568, etc.). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly). This vulnerability was triggered from HYPER-V guest using RemoteFX feature leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process).
28 CVE-2019-7247 732 Exec Code 2020-05-18 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in AODDriver2.sys in AMD OverDrive. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x81112ee0 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.
29 CVE-2019-7246 732 Exec Code 2020-05-18 2021-07-21
4.6
None Local Low Not required Partial Partial Partial
An issue was discovered in atillk64.sys in AMD ATI Diagnostics Hardware Abstraction Sys/Overclocking Utility 5.11.9.0. The vulnerable driver exposes a wrmsr instruction and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.
30 CVE-2017-7262 20 DoS 2017-03-25 2017-03-29
4.9
None Local Low Not required None None Complete
The AMD Ryzen processor with AGESA microcode through 2017-01-27 allows local users to cause a denial of service (system hang) via an application that makes a long series of FMA3 instructions, as demonstrated by the Flops test suite.
31 CVE-2017-5927 200 +Info 2017-02-27 2017-03-02
5.0
None Remote Low Not required Partial None None
Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern ARM processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.
32 CVE-2017-5926 200 +Info 2017-02-27 2017-03-02
5.0
None Remote Low Not required Partial None None
Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern AMD processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.
33 CVE-2017-5925 200 +Info 2017-02-27 2017-03-02
5.0
None Remote Low Not required Partial None None
Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern Intel processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.
34 CVE-2015-7724 59 +Priv 2017-06-07 2018-10-09
7.2
None Local Low Not required Complete Complete Complete
AMD fglrx-driver before 15.9 allows local users to gain privileges via a symlink attack. NOTE: This vulnerability exists due to an incomplete fix for CVE-2015-7723.
35 CVE-2015-7723 59 +Priv 2017-06-07 2018-10-09
7.2
None Local Low Not required Complete Complete Complete
AMD fglrx-driver before 15.7 allows local users to gain privileges via a symlink attack.
Total number of vulnerabilities : 35   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.