{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T21:28:18.320","vulnerabilities":[{"cve":{"id":"CVE-2020-6100","sourceIdentifier":"talos-cna@cisco.com","published":"2020-07-20T21:15:12.733","lastModified":"2024-11-21T05:35:05.793","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An exploitable memory corruption vulnerability exists in AMD atidxx64.dll 26.20.15019.19000 graphics driver. A specially crafted pixel shader can cause memory corruption vulnerability. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability potentially could be triggered from guest machines running virtualization environments (ie. VMware, qemu, VirtualBox etc.) in order to perform guest-to-host escape - as it was demonstrated before (TALOS-2018-0533, TALOS-2018-0568, etc.). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly). This vulnerability was triggered from HYPER-V guest using RemoteFX feature leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process)."},{"lang":"es","value":"Se presenta una vulnerabilidad de corrupción de memoria explotable en el controlador de gráficos atidxx64.dll de AMD versión 26.20.15019.19000. Un sombreador de píxeles especialmente diseñado puede causar una vulnerabilidad de corrupción de memoria. Un atacante puede proporcionar un archivo shader especialmente diseñado para desencadenar esta vulnerabilidad. Esta vulnerabilidad podría ser desencadenada potencialmente desde máquinas invitadas que ejecutan entornos de virtualización (es decir, VMware, qemu, VirtualBox, etc.) en función de llevar a cabo el escape de invitado a host, como fue demostrado antes (TALOS-2018-0533, TALOS-2018- 0568, etc.). Teóricamente, esta vulnerabilidad podría ser activada también desde el navegador web (usando webGL y webassembly). Esta vulnerabilidad fue desencadenada desde el invitado HYPER-V utilizando la funcionalidad RemoteFX conllevando a una ejecución de código vulnerable en el host HYPER-V (dentro del proceso rdvgm.exe)"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:amd:radeon_directx_11_driver_atidxx64.dll:26.20.15019.19000:*:*:*:*:*:*:*","matchCriteriaId":"81578A1D-D11C-480F-B836-76C976B4B536"}]}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1040","source":"talos-cna@cisco.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1040","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}