Description
Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space potentially leading to privilege escalation.
CVSS Metrics
- Vector
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- local
- Complexity
- low
- Privileges
- low
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- NVD-CWE-noinfoCWE-119
Metadata
- Primary Vendor
- AMD
- Published
- 2/13/2024
- Last Modified
- 5/7/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
amd : ryzen_embedded_5950e_firmwareamd : ryzen_embedded_5900e_firmwareamd : ryzen_embedded_5800e_firmwareamd : ryzen_embedded_5600e_firmwareamd : ryzen_embedded_v2516_firmwareamd : ryzen_embedded_v2546_firmwareamd : ryzen_embedded_v2718_firmwareamd : ryzen_embedded_v2748_firmwareamd : ryzen_embedded_r2312_firmwareamd : ryzen_embedded_r2314_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.