CVE-2021-26360

An attacker with local access to the system can make unauthorized modifications of the security configuration of the SOC registers. This could allow potential corruption of AMD secure processor’s encrypted memory contents which may lead to arbitrary code execution in ASP.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*
cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*
OR cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*

History

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-863 NVD-CWE-noinfo

23 Nov 2022, 13:59

Type Values Removed Values Added
First Time Amd radeon Rx 6700s
Amd radeon Pro W6900x
Amd radeon Rx 6650m
Amd radeon Rx 6700 Xt
Amd radeon Rx 6400
Amd radeon Rx 6600s
Amd radeon Pro W6800x Duo
Amd radeon Software
Amd radeon Pro W6300m
Amd radeon Rx 6500 Xt
Amd radeon Pro W6400
Amd radeon Rx 6850m Xt
Amd radeon Rx 6800
Amd radeon Rx 6700m
Amd radeon Rx 6600 Xt
Amd radeon Pro W6500m
Amd radeon Rx 6700
Amd
Amd radeon Rx 6600
Amd radeon Pro W6600x
Amd enterprise Driver
Amd radeon Pro W6800
Amd radeon Pro W6600
Amd radeon Rx 6800s
Amd radeon Rx 6750 Xt
Amd radeon Rx 6650 Xt
Amd radeon Rx 6800m
Amd radeon Rx 6650m Xt
Amd radeon Pro W6600m
Amd radeon Pro Software
Amd radeon Rx 6950 Xt
Amd radeon Rx 6300m
Amd radeon Rx 6800 Xt
Amd radeon Rx 6500m
Amd radeon Pro W6800x
Amd radeon Rx 6600m
Amd radeon Rx 6900 Xt
CPE cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
cpe:2.3:a:amd:radeon_pro_software:*:*:*:*:enterprise:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*
cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6750_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6850m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650m_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6900_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700s:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6800m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6950_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6700m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6650_xt:-:*:*:*:*:*:*:*
cpe:2.3:a:amd:enterprise_driver:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_6600:-:*:*:*:*:*:*:*
References (MISC) https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 - (MISC) https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1029 - Vendor Advisory
CWE CWE-863
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

09 Nov 2022, 21:44

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-09 21:15

Updated : 2023-12-10 14:35


NVD link : CVE-2021-26360

Mitre link : CVE-2021-26360

CVE.ORG link : CVE-2021-26360


JSON object : View

Products Affected

amd

  • radeon_rx_6600_xt
  • radeon_pro_w6500m
  • radeon_pro_w6800x
  • radeon_rx_6700s
  • radeon_rx_6650m_xt
  • radeon_rx_6500_xt
  • radeon_rx_6600m
  • radeon_pro_w6800
  • radeon_software
  • radeon_pro_software
  • radeon_pro_w6600
  • radeon_rx_6600
  • radeon_rx_6800m
  • radeon_pro_w6600x
  • radeon_pro_w6800x_duo
  • radeon_rx_6700
  • radeon_rx_6400
  • radeon_rx_6850m_xt
  • radeon_rx_6700_xt
  • radeon_rx_6800s
  • radeon_pro_w6900x
  • radeon_rx_6650m
  • radeon_rx_6800
  • radeon_rx_6800_xt
  • radeon_pro_w6400
  • radeon_rx_6700m
  • radeon_rx_6500m
  • radeon_pro_w6600m
  • radeon_rx_6900_xt
  • radeon_rx_6750_xt
  • radeon_pro_w6300m
  • radeon_rx_6600s
  • radeon_rx_6950_xt
  • enterprise_driver
  • radeon_rx_6650_xt
  • radeon_rx_6300m