{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T16:27:51.560","vulnerabilities":[{"cve":{"id":"CVE-2021-46757","sourceIdentifier":"psirt@amd.com","published":"2024-02-13T20:15:50.060","lastModified":"2025-05-07T22:15:15.447","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Insufficient checking of memory buffer in ASP\nSecure OS may allow an attacker with a malicious TA to read/write to the ASP\nSecure OS kernel virtual address space potentially leading to privilege\nescalation."},{"lang":"es","value":"Una comprobación insuficiente del búfer de memoria en ASP Secure OS puede permitir que un atacante con un TA malicioso lea/escriba en el espacio de direcciones virtuales del kernel de ASP Secure OS, lo que podría provocar una escalada de privilegios."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:ryzen_embedded_5950e_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"embam4pi_1.0.0.0","matchCriteriaId":"945D1A7C-13D6-4E1D-A293-46AB61A51015"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:ryzen_embedded_5950e:-:*:*:*:*:*:*:*","matchCriteriaId":"B2CDC476-E234-46D1-9B89-908638B03C11"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:ryzen_embedded_5900e_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"embam4pi_1.0.0.0","matchCriteriaId":"680BA0B9-AA41-49AA-8D9D-C51DD6B7B69F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:ryzen_embedded_5900e:-:*:*:*:*:*:*:*","matchCriteriaId":"916C3DDF-3217-4500-A8F6-880B49B65EC0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:ryzen_embedded_5800e_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"embam4pi_1.0.0.0","matchCriteriaId":"B1F26E7C-ABDA-4E83-8212-131248F540A3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:ryzen_embedded_5800e:-:*:*:*:*:*:*:*","matchCriteriaId":"72EB6E15-8E8D-454B-95A3-21467EB11EC8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:ryzen_embedded_5600e_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"embam4pi_1.0.0.0","matchCriteriaId":"C9A00516-2CD6-4DBD-85DB-4650AD6E7FBC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:ryzen_embedded_5600e:-:*:*:*:*:*:*:*","matchCriteriaId":"412CD3E7-DD64-465F-A578-34F1155FA7B4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:ryzen_embedded_v2516_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"embeddedpi-fp6_1.0.0.6","matchCriteriaId":"47AA31D3-F690-452F-9DEE-B94F36B45FFD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:ryzen_embedded_v2516:-:*:*:*:*:*:*:*","matchCriteriaId":"F6402F9A-B638-4A4E-9D24-53B2AFB42059"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:ryzen_embedded_v2546_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"embeddedpi-fp6_1.0.0.6","matchCriteriaId":"BA990A91-218B-465D-8900-D50651E26472"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:ryzen_embedded_v2546:-:*:*:*:*:*:*:*","matchCriteriaId":"DC8E890D-7A7F-479E-B555-00D948784F50"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:ryzen_embedded_v2718_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"embeddedpi-fp6_1.0.0.6","matchCriteriaId":"8DDB6676-2682-42E5-9316-2DE65C086A8C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:ryzen_embedded_v2718:-:*:*:*:*:*:*:*","matchCriteriaId":"D910E1FD-3C27-4993-B827-AA6F9186A717"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:ryzen_embedded_v2748_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"embeddedpi-fp6_1.0.0.6","matchCriteriaId":"D7A31411-12D6-4CC0-9CF7-72C8ACA92DF2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:ryzen_embedded_v2748:-:*:*:*:*:*:*:*","matchCriteriaId":"99DD7CCE-AEA5-4ABC-8764-FEC55E9D2ABB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:ryzen_embedded_r2312_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"embeddedpi-fp6_1.0.0.6","matchCriteriaId":"EC578789-BA65-4473-86A8-EDC1DA31D5C2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:ryzen_embedded_r2312:-:*:*:*:*:*:*:*","matchCriteriaId":"10E2A657-E504-4581-BA35-9B6C2BD46323"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:amd:ryzen_embedded_r2314_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"embeddedpi-fp6_1.0.0.6","matchCriteriaId":"56D1FDE4-4C56-4EC5-A0DF-84D80AD6320E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:amd:ryzen_embedded_r2314:-:*:*:*:*:*:*:*","matchCriteriaId":"D68042FB-736E-43AD-9A63-AAE8C342FF8F"}]}]}],"references":[{"url":"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001","source":"psirt@amd.com","tags":["Vendor Advisory"]},{"url":"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}