Vulnerabilities > AMD > Athlon Gold 3150G Firmware

DATE CVE VULNERABILITY TITLE RISK
2023-11-14 CVE-2023-20521 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in AMD products
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
high complexity
amd CWE-367
5.7
2023-08-08 CVE-2023-20555 Out-of-bounds Write vulnerability in AMD products
Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.
local
low complexity
amd CWE-787
7.8
2023-08-08 CVE-2023-20588 Divide By Zero vulnerability in multiple products
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 
local
low complexity
debian amd xen fedoraproject microsoft CWE-369
5.5
2023-08-08 CVE-2023-20589 Unspecified vulnerability in AMD products
An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution. 
low complexity
amd
6.8
2023-05-09 CVE-2021-46754 Improper Input Validation vulnerability in AMD products
Insufficient input validation in the ASP (AMD Secure Processor) bootloader may allow an attacker with a compromised Uapp or ABL to coerce the bootloader into exposing sensitive information to the SMU (System Management Unit) resulting in a potential loss of confidentiality and integrity.
network
low complexity
amd CWE-20
critical
9.1
2023-05-09 CVE-2021-46759 Out-of-bounds Write vulnerability in AMD products
Improper syscall input validation in AMD TEE (Trusted Execution Environment) may allow an attacker with physical access and control of a Uapp that runs under the bootloader to reveal the contents of the ASP (AMD Secure Processor) bootloader accessible memory to a serial port, resulting in a potential loss of integrity.
low complexity
amd CWE-787
6.1
2023-05-09 CVE-2021-46792 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in AMD products
Time-of-check Time-of-use (TOCTOU) in the BIOS2PSP command may allow an attacker with a malicious BIOS to create a race condition causing the ASP bootloader to perform out-of-bounds SRAM reads upon an S3 resume event potentially leading to a denial of service.
network
high complexity
amd CWE-367
5.9
2023-05-09 CVE-2021-46794 Out-of-bounds Read vulnerability in AMD products
Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.
network
low complexity
amd CWE-125
7.5
2023-05-09 CVE-2021-46749 Out-of-bounds Read vulnerability in AMD products
Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.
network
low complexity
amd CWE-125
7.5
2023-05-09 CVE-2021-46753 Unspecified vulnerability in AMD products
Failure to validate the length fields of the ASP (AMD Secure Processor) sensor fusion hub headers may allow an attacker with a malicious Uapp or ABL to map the ASP sensor fusion hub region and overwrite data structures leading to a potential loss of confidentiality and integrity.
network
low complexity
amd
critical
9.1